informa

Insider Threats

Why the C-Suite Doesn't Need Access to All Corporate Data
If zero trust is to work properly, then it must apply to everyone.
December 06, 2021
If zero trust is to work properly, then it must apply to everyone.
by Rajesh Ganesan, Vice President of Product at ManageEngine
December 06, 2021
5 min read
Article
How Will Cyber Threats Impact the Beijing Winter Olympics?
NTT helped the International Olympic Committee dodge a security bullet in Tokyo. The world will watch to see if it can pull off a similar feat in Beijing for the upcoming Winter Games.
December 01, 2021
NTT helped the International Olympic Committee dodge a security bullet in Tokyo. The world will watch to see if it can pull off a similar feat in Beijing for the upcoming Winter Games.
by Daniel Smith, Head of Research for Radware’s Cyber Threat Intelligence division
December 01, 2021
4 min read
Article
Swarm Intelligence May Be Just the Ticket for Improved Network & Device Security
Based on the reaction of a single insect in a swarm, messages are passed along peer to peer, and an entire environment can respond without a central leader processing data and giving orders.
November 18, 2021
Based on the reaction of a single insect in a swarm, messages are passed along peer to peer, and an entire environment can respond without a central leader processing data and giving orders.
by Morey Haber, CTO and CISO, BeyondTrust
November 18, 2021
5 min read
Article
How to Navigate the Mitigation of Deepfakes
Deepfakes are already several steps ahead of the technology that can detect and warn us about them.
November 17, 2021
Deepfakes are already several steps ahead of the technology that can detect and warn us about them.
by Etay Maor, Sr. Director Security Strategy at Cato Networks
November 17, 2021
5 min read
Article
How Visibility Became the Lifeblood of SecOps and Business Success
The best way to succeed in long-term cybersecurity is to invest in visibility because you can't protect or defend against what you can't see.
November 15, 2021
The best way to succeed in long-term cybersecurity is to invest in visibility because you can't protect or defend against what you can't see.
by PJ Kirner, CTO & Founder, Illumio
November 15, 2021
4 min read
Article
Should Our Security Controls Be More Like North Korea or Norway?
When the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.
November 11, 2021
When the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.
by Sounil Yu, CISO and Head of Research of JupiterOne
November 11, 2021
5 min read
Article
Defining the Hierarchy of Value in Cyber Intelligence
One size won't fit all as we try to reconcile the need to demonstrate expertise and value with keeping clients and researchers safe.
November 10, 2021
One size won't fit all as we try to reconcile the need to demonstrate expertise and value with keeping clients and researchers safe.
by Adam Darrah, Director of Threat Intelligence Services, ZeroFox
November 10, 2021
5 min read
Article
HelpSystems Acquires Digital Guardian, Extends DLP Capabilities
The acquisition strengthens HelpSystems’ data security portfolio with data loss prevention capabilities across the endpoint, network, and cloud.
October 27, 2021
The acquisition strengthens HelpSystems’ data security portfolio with data loss prevention capabilities across the endpoint, network, and cloud.
by Dark Reading Staff, Dark Reading
October 27, 2021
2 min read
Article
What Squid Game Teaches Us About Cybersecurity
When life inside the security operations center feels treacherous, here are some suggestions for getting out alive.
October 22, 2021
When life inside the security operations center feels treacherous, here are some suggestions for getting out alive.
by Orion Cassetto, Senior Director of Product Marketing at Cycode
October 22, 2021
6 min read
Article
The Human Element Is the Weakest Link
While the recent Facebook outage was a major inconvenience, the impact of leaked business operations documents is a much bigger issue than being down for a few hours.
October 14, 2021
While the recent Facebook outage was a major inconvenience, the impact of leaked business operations documents is a much bigger issue than being down for a few hours.
by Ron Bradley, Vice President, Shared Assessments
October 14, 2021
4 min read
Article
Why Not Sharing Is Caring When It Comes to Cybersecurity
Three key tips to help ensure your employees keep vital information safe.
October 06, 2021
Three key tips to help ensure your employees keep vital information safe.
by Matt Lindley, COO and CISO at NINJIO
October 06, 2021
5 min read
Article
5 Ways to Become a Better Cyber-Threat Exterminator
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and improve incident response times.
September 30, 2021
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and improve incident response times.
by Mike Wilkes, Chief Information Security Officer at SecurityScorecard
September 30, 2021
5 min read
Article
UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.
September 22, 2021
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.
by Maxine Holt, Research Director, Omdia
September 22, 2021
3 min read
Article
Why Security Pros Should Rethink Their Focus on Information Resilience
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's ability to return to a prior state doesn't mean it's sufficiently resilient.
September 22, 2021
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's ability to return to a prior state doesn't mean it's sufficiently resilient.
by Sounil Yu, CISO and Head of Research of JupiterOne
September 22, 2021
5 min read
Article
Why Your People Are the Best Untapped Security Strategy
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among employees.
July 29, 2021
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among employees.
by Jason Lee, Chief Information Security Officer, Zoom
July 29, 2021
4 min read
Article