informa

Insider Threats

Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 18, 2022
1 min read
Article
Why Security Awareness Training Should Begin in the C-Suite
It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.
January 11, 2022
It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.
by Ashley Rose, CEO and Co-Founder, Living Security
January 11, 2022
4 min read
Article
Is Data Security Worthless if the Data Life Cycle Lacks Clarity?
If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.
December 17, 2021
If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.
by François Amigorena, Founder & CEO, IS Decisions
December 17, 2021
4 min read
Article
Why Cloud Storage Isn't Immune to Ransomware
Cloud security is a shared responsibility. which sometimes leads to security gaps and complexity in risk management.
December 15, 2021
Cloud security is a shared responsibility. which sometimes leads to security gaps and complexity in risk management.
by Shai Morag, CEO, Ermetic
December 15, 2021
4 min read
Article
How to Build a Better Internal Fraud Protection Program
Fraud awareness training is just the beginning.
December 09, 2021
Fraud awareness training is just the beginning.
by Timothy Ball, Executive Vice President, The Bonadio Group
December 09, 2021
5 min read
Article
Why the C-Suite Doesn't Need Access to All Corporate Data
If zero trust is to work properly, then it must apply to everyone.
December 06, 2021
If zero trust is to work properly, then it must apply to everyone.
by Rajesh Ganesan, Vice President of Product at ManageEngine
December 06, 2021
5 min read
Article
How Will Cyber Threats Impact the Beijing Winter Olympics?
NTT helped the International Olympic Committee dodge a security bullet in Tokyo. The world will watch to see if it can pull off a similar feat in Beijing for the upcoming Winter Games.
December 01, 2021
NTT helped the International Olympic Committee dodge a security bullet in Tokyo. The world will watch to see if it can pull off a similar feat in Beijing for the upcoming Winter Games.
by Daniel Smith, Head of Research for Radware’s Cyber Threat Intelligence division
December 01, 2021
4 min read
Article
Swarm Intelligence May Be Just the Ticket for Improved Network & Device Security
Based on the reaction of a single insect in a swarm, messages are passed along peer to peer, and an entire environment can respond without a central leader processing data and giving orders.
November 18, 2021
Based on the reaction of a single insect in a swarm, messages are passed along peer to peer, and an entire environment can respond without a central leader processing data and giving orders.
by Morey Haber, CTO and CISO, BeyondTrust
November 18, 2021
5 min read
Article
How to Navigate the Mitigation of Deepfakes
Deepfakes are already several steps ahead of the technology that can detect and warn us about them.
November 17, 2021
Deepfakes are already several steps ahead of the technology that can detect and warn us about them.
by Etay Maor, Sr. Director Security Strategy at Cato Networks
November 17, 2021
5 min read
Article
How Visibility Became the Lifeblood of SecOps and Business Success
The best way to succeed in long-term cybersecurity is to invest in visibility because you can't protect or defend against what you can't see.
November 15, 2021
The best way to succeed in long-term cybersecurity is to invest in visibility because you can't protect or defend against what you can't see.
by PJ Kirner, CTO & Founder, Illumio
November 15, 2021
4 min read
Article
Should Our Security Controls Be More Like North Korea or Norway?
When the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.
November 11, 2021
When the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.
by Sounil Yu, CISO and Head of Research of JupiterOne
November 11, 2021
5 min read
Article
Defining the Hierarchy of Value in Cyber Intelligence
One size won't fit all as we try to reconcile the need to demonstrate expertise and value with keeping clients and researchers safe.
November 10, 2021
One size won't fit all as we try to reconcile the need to demonstrate expertise and value with keeping clients and researchers safe.
by Adam Darrah, Director of Threat Intelligence Services, ZeroFox
November 10, 2021
5 min read
Article
HelpSystems Acquires Digital Guardian, Extends DLP Capabilities
The acquisition strengthens HelpSystems’ data security portfolio with data loss prevention capabilities across the endpoint, network, and cloud.
October 27, 2021
The acquisition strengthens HelpSystems’ data security portfolio with data loss prevention capabilities across the endpoint, network, and cloud.
by Dark Reading Staff, Dark Reading
October 27, 2021
2 min read
Article
What Squid Game Teaches Us About Cybersecurity
When life inside the security operations center feels treacherous, here are some suggestions for getting out alive.
October 22, 2021
When life inside the security operations center feels treacherous, here are some suggestions for getting out alive.
by Orion Cassetto, Senior Director of Product Marketing at Cycode
October 22, 2021
6 min read
Article
The Human Element Is the Weakest Link
While the recent Facebook outage was a major inconvenience, the impact of leaked business operations documents is a much bigger issue than being down for a few hours.
October 14, 2021
While the recent Facebook outage was a major inconvenience, the impact of leaked business operations documents is a much bigger issue than being down for a few hours.
by Ron Bradley, Vice President, Shared Assessments
October 14, 2021
4 min read
Article