informa

Cybersecurity In-Depth

Edge Articles

In-Depth feature articles, analysis, and commentary on cybersecurity trends and best practices.

Fraud Is On the Rise, and It's Going to Get Worse
The acceleration of the digital transformation resulted in a surge of online transactions, greater adoption of digital payments, and increased fraud.
January 21, 2022
The acceleration of the digital transformation resulted in a surge of online transactions, greater adoption of digital payments, and increased fraud.
by Edge Editors, Dark Reading
January 21, 2022
3 min read
Article
What Happens to My Organization If APIs Are Compromised?
Once attackers have obtained access, they can compromise other systems or pivot within your networks.
January 19, 2022
Once attackers have obtained access, they can compromise other systems or pivot within your networks.
by Michael Isbitski, Technical Evangelist at Salt Security
January 19, 2022
2 min read
Article
End Users Remain Organizations' Biggest Security Risk
Yet they're showing signs of improvement across several important areas, a Dark Reading survey reveals.
January 18, 2022
Yet they're showing signs of improvement across several important areas, a Dark Reading survey reveals.
by Dark Reading Staff, Dark Reading
January 18, 2022
2 min read
Article
Fighting Back Against Pegasus, Other Advanced Mobile Malware
Detecting infection traces from Pegasus and other APTs can be tricky, complicated by iOS and Android security features.
January 13, 2022
Detecting infection traces from Pegasus and other APTs can be tricky, complicated by iOS and Android security features.
by Costin Raiu, Global Director, Kaspersky GReAT
January 13, 2022
6 min read
Article
Why Is Cyber Assessment So Important in Security?
All the pen testing and tabletop exercises in the world won't help unless an organization has a complete and accurate understanding of its assets.
January 12, 2022
All the pen testing and tabletop exercises in the world won't help unless an organization has a complete and accurate understanding of its assets.
by Erkang Zheng, Founder and CEO, JupiterOne
January 12, 2022
2 min read
Article
Let's Play! Raising the Stakes for Threat Modeling With Card Games
On a recent Friday night, three security experts got together to play custom games that explore attack risks in an engaging way.
January 11, 2022
On a recent Friday night, three security experts got together to play custom games that explore attack risks in an engaging way.
by Andrada Fiscutean, Contributing Writer
January 11, 2022
7 min read
Article
What Editing Crosswords Can Teach Us About Security Leadership
When security leaders look for mistakes, they often find them before customers do.
January 10, 2022
When security leaders look for mistakes, they often find them before customers do.
by Joshua Goldfarb, Director of Product Management at F5
January 10, 2022
5 min read
Article
IT/OT Convergence Is More Than a Catchy Phrase
The most successful strategies for protecting IT and OT from growing threats will include use of both the ISO 27000 series and ISA/IEC 62443 family of standards.
January 07, 2022
The most successful strategies for protecting IT and OT from growing threats will include use of both the ISO 27000 series and ISA/IEC 62443 family of standards.
by Megan Samford, Vice President and Chief Product Security Officer for Energy Management at Schneider Electric
January 07, 2022
4 min read
Article
Enterprises Worry About Increased Data Risk in Cloud
The 2021 Strategic Security Survey highlights concerns related to the cloud environment, such as the ability to detect breaches and the increasing number of attacks against cloud systems.
January 06, 2022
The 2021 Strategic Security Survey highlights concerns related to the cloud environment, such as the ability to detect breaches and the increasing number of attacks against cloud systems.
by Edge Editors, Dark Reading
January 06, 2022
2 min read
Article
Which Cloud Strategy Is Right For My Organization's Security Needs?
The massive Amazon Web Services outage in December had many security leaders asking whether they should be going multicloud or multiregion for their cloud environments.
January 05, 2022
The massive Amazon Web Services outage in December had many security leaders asking whether they should be going multicloud or multiregion for their cloud environments.
by Ryan Sydlik, Security engineer, Telos
January 05, 2022
2 min read
Article
Vinnie Liu Has a Mission: Keeping People Safe Online and Offline
Security Pro File: The years at the National Security Agency shaped Vinnie Liu's views on security. "We're missionaries, not mercenaries," he says.
January 04, 2022
Security Pro File: The years at the National Security Agency shaped Vinnie Liu's views on security. "We're missionaries, not mercenaries," he says.
by Carlo Massimo, Freelance Writer
January 04, 2022
7 min read
Article
Name That Edge Toon: In Your Face!
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
January 03, 2022
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 03, 2022
1 min read
Article
Adding Resiliency to BGP Avoids Network Outages, Data Loss
Cisco Umbrella has mechanisms in place to ensure that end users don't lose connectivity even if ISPs and service providers experience outages.
December 31, 2021
Cisco Umbrella has mechanisms in place to ensure that end users don't lose connectivity even if ISPs and service providers experience outages.
by Fahmida Y. Rashid, Features Editor, Dark Reading
December 31, 2021
4 min read
Article
Getting Started With Threat-Informed Security Programs
Security leaders need to examine their business model, document risks, and develop a strategic plan to address those risks.
December 30, 2021
Security leaders need to examine their business model, document risks, and develop a strategic plan to address those risks.
by Sakshi Udavant, Freelance Writer
December 30, 2021
3 min read
Article
Cisco's Helen Patton on the Security Outcomes Study
The latest installment of Edge Chats steps through the Security Outcomes Study and the activities that security practitioners believe lead to positive results with a security program.
December 30, 2021
The latest installment of Edge Chats steps through the Security Outcomes Study and the activities that security practitioners believe lead to positive results with a security program.
by Edge Editors, Dark Reading
December 30, 2021
2 min read
Article