Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

6 Dangerous Defaults Attackers Love (and You Should Know)

 
 
Default configurations can be massive vulnerabilities. Here are a half dozen to check on for your network. more >
 
Ask the Experts

How Should I Securely Destroy/Discard My Devices?

 
See more featured articles from THE EDGE
 
THE EDGE Threat Monitor
 
Burning to a Crisp
 

According to the 2020 Black Hat Attendee Survey, infosec professionals are even more burnt-out this year than they were in 2019.
 
See more reports from THE EDGE THREAT MONITOR
 
ASK THE EXPERTS
 
How Should I Securely Destroy/Discard My Devices?

Kurtis Minder, CEO of GroupSense: Companies often wish to dispose of depreciated technology assets. Given the amount of sensitive data on many of these devices ...

0  responses
Will the Pandemic Complicate Cyber Insurance Claims?

Jeff Dennis, head of Newmeyer Dillion's Privacy & Data Security practice: Most organizations are now requiring that...

1  responses
I Want to Work in Industrial IoT Security. What Lingo Do I Need to Know?

Tanner Johnson, senior cybersecurity analyst at Omdia: The industrial IoT (IIoT) is a market in a state of major expanse.

0  responses
 
See more questions and answers from ASK THE EXPERTS
 
 
Flash Poll
   OVER THE EDGE
Building Cybersecurity Strategies in Sub-Saharan Africa

Filmed for Dark Reading News Desk at Black Hat Virtual.

LAURA TICH: We have that imbalance, where the big organizations are more protected, where the smaller ones -- which are the most common businesses in the region -- they are least protected... Sometimes they do get the tools, they do get the funding to buy some critical tools, but there's a lack of skills to handle or people who understand how to work those tools. So there are a lot of factors that contribute to our growth -- or lack thereof -- in the cybersecurity industry.

 

Name That Toon: Tough Times, Tough Measures
Latest Comment: Wear a mask, please!