informa

Cybersecurity In-Depth

Edge Ask the Experts

A forum for cybersecurity professionals to ask questions and get answers about IT security threats and best practices.

Why Should My Organization Consider XDR?
XDR is a newish industry term addressing a very old problem: security products that don't work together to detect threat...
October 21, 2021
XDR is a newish industry term addressing a very old problem: security products that don't work together to detect threat...
by Al Huger, Vice President and General Manager of Cisco Security Platform & Response
October 21, 2021
2 min read
Article
What Does a Chief Product Security Officer Do?
A CPSO bridges the gap between developers and security to ensure products are built securely and safely.
October 13, 2021
A CPSO bridges the gap between developers and security to ensure products are built securely and safely.
by Sean Nikkel, Senior Cyber Threat Intel Analyst, Digital Shadows
October 13, 2021
2 min read
Article
What Are Some Red Flags in a Vendor Security Assessment?
The last thing you want is a vendor that lies to you about its security practices.
October 07, 2021
The last thing you want is a vendor that lies to you about its security practices.
by John Bambenek, Principal Threat Hunter, Netenrich
October 07, 2021
2 min read
Article
Why Should I Care About HTTP Request Smuggling?
HTTP request smuggling is a growing vulnerability, but you can manage the risk with proper server configuration.
September 29, 2021
HTTP request smuggling is a growing vulnerability, but you can manage the risk with proper server configuration.
by Asaf Karas, CTO. JFrog Security
September 29, 2021
2 min read
Article
What Is the Difference Between Security and Resilience?
Resilience shifts the focus toward eliminating the probable impact of the full attack chain.
September 24, 2021
Resilience shifts the focus toward eliminating the probable impact of the full attack chain.
by Tim Wade, Technical Director, CTO Team, Vectra
September 24, 2021
2 min read
Article
What Are the Different Types of Cyber Insurance?
Even with the best cybersecurity defenses in place, organizations can fall victim to a cyberattack.
September 22, 2021
Even with the best cybersecurity defenses in place, organizations can fall victim to a cyberattack.
by Isabelle Dumont, Vice President of Market Engagement, Cowbell Cyber
September 22, 2021
2 min read
Article
How Should the CSO Work With the Chief Privacy Officer?
The chief security officer needs to be in constant communication with the chief privacy officer about what's working or ...
September 17, 2021
The chief security officer needs to be in constant communication with the chief privacy officer about what's working or ...
by Chris Bush, Chief Customer Officer, Black Kite
September 17, 2021
2 min read
Article
How Can I Reduce the Chances of My Company Getting Hit by Ransomware?
A few cyber-hygiene best practices can get you started.
September 10, 2021
A few cyber-hygiene best practices can get you started.
by Kurtis Minder, co-Founder & CEO, GroupSense
September 10, 2021
1 min read
Article
What Does a Virtual CISO Do, and When Should an Org Have One?
Organizations can turn to a virtual CISO to build a tailored security strategy; they don't need to wait till they have a...
September 03, 2021
Organizations can turn to a virtual CISO to build a tailored security strategy; they don't need to wait till they have a...
by Aaron Boissonnault, CISO, Navisite
September 03, 2021
2 min read
Article
How Do I Make Getting Phished Less of a Crisis?
Rather than fruitlessly trying to train the “human error” out of humans, focus on creating more humane systems for the i...
August 30, 2021
Rather than fruitlessly trying to train the “human error” out of humans, focus on creating more humane systems for the i...
by Kat Sweet, Security Awareness Program Manager, HubSpot
August 30, 2021
3 min read
Article
What Are Some of the Must-Have Steps in a Ransomware Response Plan?
What should organizations be sure to include in a ransomware response plan, and which steps are commonly missed?
August 06, 2021
What should organizations be sure to include in a ransomware response plan, and which steps are commonly missed?
by Liam O’Murchu, Liam O’Murchu, Director, Symantec, Division of Broadcom, Security Technology and Response Group
August 06, 2021
3 min read
Article
How Do I Let Go of 'Human Error' as an Explanation for Incidents?
Successfully learning from incidents requires a deeper and more expansive perspective of them.
July 27, 2021
Successfully learning from incidents requires a deeper and more expansive perspective of them.
by Kelly Shortridge, Senior Principal at Fastly
July 27, 2021
2 min read
Article
How Can I Test the Security of My Home-Office Employees' Routers?
From the most accurate to the most practical, here are a few ways to ensure both employees and organizations are protect...
June 07, 2021
From the most accurate to the most practical, here are a few ways to ensure both employees and organizations are protect...
by John Bock, Senior Research Scientist
June 07, 2021
2 min read
Article
What's the Difference Between 'Observability' and 'Visibility' in Security?
To drive holistic security success, we have to start with the interlinking of visibility and observability.
February 08, 2021
To drive holistic security success, we have to start with the interlinking of visibility and observability.
by Joe Vadakkan, Global Cloud Security Leader, Optiv Security
February 08, 2021
2 min read
Article
How Can I Help Remote Workers Secure Their Home Routers?
The most effective way is with employee security education.
November 02, 2020
The most effective way is with employee security education.
by John Bock, Senior Research Scientist
November 02, 2020
3 min read
Article