Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Considerations in a BYOD Culture

The 'bring your own device' movement has put security pros on high alert for a new breed of predator who is on the hunt to find ways to exploit the ever-expanding attack surface. more >

The 10 Essentials of Infosec Forensics

See more featured articles from THE EDGE
THE EDGE Threat Monitor
This Week in Web Application Attacks and Enterprise Threats
The latest on the number of attacks, types of attacks, and threats to enterprises' most critical IT infrastructure.
See more reports from THE EDGE THREAT MONITOR
My Company Is Looking at WAFs to Help Secure Traffic. Where Do We Start?

Akamai: Selecting a Web application firewall can be very simple or very complex. Whatever you do, try to make sure ...

1  responses
How Do I Get Management to Buy into a SecDevOps Program?

Yaron Levi, CISO at Blue Cross Blue Shield of Kansas City: Start with the end in mind. When you consider the organization's business, risk, culture, and capabilities ...

1  responses
How Can I Protect My Company Without a Security Staff?

Paul Kurtz, co-founder & CEO of TruSTAR: In an ideal world, every company would build and maintain a threat model unique to that company ...

1  responses
See more questions and answers from ASK THE EXPERTS

Dark Reading's new section for features, threat data and in-depth perspectives
More about The Edge

Flash Poll