Before we collectively step forward into 2021, we thought we'd take a look back at which articles resonated most with Edge readers in 2020. We also sprinkled in a few of our own favorites to bring you this top 20 list of features, best practices, 101s, profiles, and more. Their takeaways remain relevant as we kick off a new year.
In the midst of the Black Lives Matter protests, the familiar Anonymous caricature of Guy Fawkes reappeared — multiple times, according to the hacktivist group. But was Anonymous back? And if so, how did it change from its heyday a decade ago?
Read more
Some titles are hot, while others are not, amid rapidly shifting business priorities. The Edge asked around about which titles and skills security hiring managers are, and aren't, interested in as the skill sets they need continue to evolve.
Read more
Fearful of messing up its implementation, many enterprises are still holding out on MFA. What are some of the common missteps organizations make when they deploy MFA – and what can they do to avoid them?
Read more
While numerous types of ransomware exist, one of the more prominent and dangerous versions is Emotet. Managing the risk involves starts with understanding the way it works.
Read more
In October 2019, The Edge brought you "14 Hot Cybersecurity Certifications Now." Time, per usual, has flown, leaving us to wonder, "What difference does a year make? Especially in this very unusual year?" And are the certs a sign of things to come?
Read more
What sound do you hear in your head when you think "stereotypical hacker music"? Nine security researchers share their favorite songs and genres.
Read more
An unprecedented 2020 has shaken up security leaders' usual list of must-have technologies. What's on the horizon? They share with us their spending plans for 2021.
Read more
Researchers show no IoT device is too small to fall victim to ransomware techniques.
Read more
Tightened budgets are placing jobs at risk, but security pros say they're armed with ways to demonstrate that what they're doing merits keeping them employed.
Read more
Although the controversial option of voting by mobile app is one pressing consideration, cybersecurity experts agree that older issues need to be resolved before November 3.
Read more
As data exfiltration threats and bigger ransom requests become the norm, security professionals are advancing from the basic "keep good backups" advice.
Read more
In a rare twist, "next-gen" isn't just marketing-speak when it comes to next-gen firewalls, which function differently than traditional gear and may enable you to replace a variety of devices.
Read more
Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe (and this was before the pandemic. And the problem may hurt both them and the businesses they aim to protect.
Read more
End-of-life is here: Adobe's support for Flash is gone as of Jan. 1. Here's what we won't miss about the multimedia software platform.
Read more
Zero trust sounds so harsh. But real cybersecurity results can come from the harsh-sounding scheme that defines every relationship as fraught with danger and mistrust.
Read more
A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee's death?
Read more
You might not find these measurements on a standard cybersecurity department checklist. But they can help evaluate risks you haven't even considered yet.
Read more
Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth.
Read more
As cyber defenses improve, adversaries are shifting to stealthy "living-off-the-land" attacks that use targets' own tools against them. Here are some tips to defend your turf.
Read more
Earlier this year a phishing attack slipped through an email gateway, leading to a large-scale compromise. Here's how it happened – and how artificial intelligence was key in its detection. Read more