informa

Security Insights

Commentary/blog content written by high-profile security leaders.

3 Places to Enable 2-Factor Authentication Now
Two-factor authentication is a ubiquitous, mature technology. Whether or not you use it for your network, here are three external services for which you should immediately enable it.
August 07, 2014
Two-factor authentication is a ubiquitous, mature technology. Whether or not you use it for your network, here are three external services for which you should immediately enable it.
by Maxim Weinstein, Contributor
August 07, 2014
3 MIN READ
Article
Microsoft, No-IP, And The Need For Clarity
The Microsoft vs. No-IP case highlights the need for clear standards of abuse handling and transparency on which service providers measure up.
July 07, 2014
The Microsoft vs. No-IP case highlights the need for clear standards of abuse handling and transparency on which service providers measure up.
by Maxim Weinstein, Contributor
July 07, 2014
3 MIN READ
Article
Back To Basics
By failing to execute on basic security, we’re making the attacker's job too easy.
June 05, 2014
By failing to execute on basic security, we’re making the attacker's job too easy.
by Maxim Weinstein, Contributor
June 05, 2014
3 MIN READ
Article
Preying On A Predator
Mac OS X Snow Leopard is perfectly positioned to be the next target for cybercriminals
February 27, 2014
Mac OS X Snow Leopard is perfectly positioned to be the next target for cybercriminals
by Maxim Weinstein, Contributor
February 27, 2014
2 MIN READ
Article
When Websites Attack
Windows threats like Cryptolocker and ZeroAccess get all of the attention, but malware targeting (Linux) Web servers continues to evolve
December 31, 2013
Windows threats like Cryptolocker and ZeroAccess get all of the attention, but malware targeting (Linux) Web servers continues to evolve
by Maxim Weinstein, Contributor
December 31, 2013
3 MIN READ
Article
The Dinosaur In The Room
Support for Windows XP ends in April 2014; the implications extend beyond the workstation
December 05, 2013
Support for Windows XP ends in April 2014; the implications extend beyond the workstation
by Maxim Weinstein, Contributor
December 05, 2013
3 MIN READ
Article
What You Need To Know About CryptoLocker
CryptoLocker ransomware is terrorizing home and business users alike. Here's how to protect yourself
November 22, 2013
CryptoLocker ransomware is terrorizing home and business users alike. Here's how to protect yourself
by Maxim Weinstein, Contributor
November 22, 2013
2 MIN READ
Article
With Shared Power Comes Shared Responsibility
Security does not rest entirely on your users' shoulders, so don't make them feel like it does
October 17, 2013
Security does not rest entirely on your users' shoulders, so don't make them feel like it does
by Maxim Weinstein, Contributor
October 17, 2013
3 MIN READ
Article
The New KISS Rule: Keep Information Security Simple
IT environments are becoming more complex; the solution may be simpler security
September 25, 2013
IT environments are becoming more complex; the solution may be simpler security
by Maxim Weinstein, Contributor
September 25, 2013
2 MIN READ
Article
How To Train Your Users
Help users contribute to your organization's security by teaching them to protect The Four Cs: computers, credentials, connections, and content
September 11, 2013
Help users contribute to your organization's security by teaching them to protect The Four Cs: computers, credentials, connections, and content
by Maxim Weinstein, Contributor
September 11, 2013
3 MIN READ
Article
The More Things Change
Today's malware is more complex than ever, yet it's still based on three basic hacks
August 14, 2013
Today's malware is more complex than ever, yet it's still based on three basic hacks
by Maxim Weinstein, Contributor
August 14, 2013
3 MIN READ
Article
Has Chrome Struck Security Gold?
Some criminals have all but given up on attacking Chrome users. Have exploit authors met their match in Mountain View, or is there more to the story?
August 01, 2013
Some criminals have all but given up on attacking Chrome users. Have exploit authors met their match in Mountain View, or is there more to the story?
by Maxim Weinstein, Contributor
August 01, 2013
3 MIN READ
Article
Forget Standardization -- Embrace BYOD
The platform standardization ship has sailed, but mobile device management is your ticket to securing all of those handhelds
July 18, 2013
The platform standardization ship has sailed, but mobile device management is your ticket to securing all of those handhelds
by Maxim Weinstein, Contributor
July 18, 2013
3 MIN READ
Article
Exclusive: Pwnie Express Evolves The Role Of The Pen Tester
Pwnie Express recently released Citadel PX, which will expand the role of the pen tester. The new offering will enable greater marketability while improving quality of life
June 04, 2013
Pwnie Express recently released Citadel PX, which will expand the role of the pen tester. The new offering will enable greater marketability while improving quality of life
by Dark Reading Staff, Dark Reading
June 04, 2013
4 MIN READ
Article
Security War Games
Information security keeps evolving, but our educational methods are not evolving rapidly enough to win the cold cyberwar
May 18, 2013
Information security keeps evolving, but our educational methods are not evolving rapidly enough to win the cold cyberwar
by Dark Reading Staff, Dark Reading
May 18, 2013
4 MIN READ
Article