informa

Slideshow

7 Critical Cloud Threats Facing the Enterprise in 2023
From shadow data to misconfigurations, and overpermissioning to multicloud sprawl, Dark Reading's cloud security slideshow helps security pros understand the threat horizon.
February 09, 2023
From shadow data to misconfigurations, and overpermissioning to multicloud sprawl, Dark Reading's cloud security slideshow helps security pros understand the threat horizon.
by Elizabeth Montalbano, Contributor, Dark Reading
February 09, 2023
12 MIN READ
Slideshow
6 Examples of the Evolution of a Scam Site
Examining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us understand how brand impersonation sites evolve.
February 02, 2023
Examining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us understand how brand impersonation sites evolve.
by Ericka Chickowski, Contributing Writer, Dark Reading
February 02, 2023
7 MIN READ
Slideshow
A Child's Garden of Cybersecurity
Whether you dream of your child becoming a CISO or just want them to improve their security hygiene, consider this roundup of literary geekery.
January 26, 2023
Whether you dream of your child becoming a CISO or just want them to improve their security hygiene, consider this roundup of literary geekery.
by Karen Spiegelman, Features Editor
January 26, 2023
9 MIN READ
Slideshow
Live From London: Next-Gen Cybersecurity Takes Stage at Black Hat Europe
Check out our slideshow detailing the emerging cybersecurity trends in cloud, creating a defensible Internet, malware evolution, and more that lit up audiences in London.
December 16, 2022
Check out our slideshow detailing the emerging cybersecurity trends in cloud, creating a defensible Internet, malware evolution, and more that lit up audiences in London.
by Dark Reading Staff, Dark Reading
December 16, 2022
10 MIN READ
Slideshow
7 Ways Gaming Companies Can Battle Cybercrime on Their Platforms
Balancing gameplay and security can drive down risks and improve gamers' trust and loyalty. Check out this slideshow for how.
December 09, 2022
Balancing gameplay and security can drive down risks and improve gamers' trust and loyalty. Check out this slideshow for how.
by Ericka Chickowski, Contributing Writer, Dark Reading
December 09, 2022
6 MIN READ
Slideshow
Time to Get Kids Hacking: Our 2022 Holiday Gift Guide
Check out our slideshow of 10 fun games and toys that teach programming principles, electronics, and engineering concepts to get kids ready to hack the planet.
November 21, 2022
Check out our slideshow of 10 fun games and toys that teach programming principles, electronics, and engineering concepts to get kids ready to hack the planet.
by Ericka Chickowski, Contributing Writer, Dark Reading
November 21, 2022
5 MIN READ
Slideshow
Veterans Day Salute: 6 Reasons Why You Want Vets in Your Cyber Platoon
We commend vets in cyber, with this slideshow look at how the training and experience of former military personnel can be a big, differentiating asset in cybersecurity environments.
November 10, 2022
We commend vets in cyber, with this slideshow look at how the training and experience of former military personnel can be a big, differentiating asset in cybersecurity environments.
by Jai Vijayan, Contributing Writer, Dark Reading
November 10, 2022
5 MIN READ
Slideshow
7 Hidden Social Media Cyber-Risks for Enterprises
Leaning on social media to amplify your company's brand? Here's a look at the emerging cybersecurity risks that can arise from TikTok, LinkedIn, Twitter, and other platforms.
October 27, 2022
Leaning on social media to amplify your company's brand? Here's a look at the emerging cybersecurity risks that can arise from TikTok, LinkedIn, Twitter, and other platforms.
by Ericka Chickowski, Contributing Writer, Dark Reading
October 27, 2022
6 MIN READ
Slideshow
8 Trends Driving Cybersecurity in the Public Sector
CISOs and security leaders in state and local governments are dealing with increasing threats like ransomware — with varying degrees of cyber maturity.
October 20, 2022
CISOs and security leaders in state and local governments are dealing with increasing threats like ransomware — with varying degrees of cyber maturity.
by Ericka Chickowski, Contributing Writer, Dark Reading
October 20, 2022
4 MIN READ
Slideshow
7 IoT Devices That Make Security Pros Cringe
A look at everything from truly dumb smart devices to cool-looking IoT tech with huge cybersecurity and privacy implications.
October 06, 2022
A look at everything from truly dumb smart devices to cool-looking IoT tech with huge cybersecurity and privacy implications.
by Ericka Chickowski, Contributing Writer, Dark Reading
October 06, 2022
8 MIN READ
Slideshow
Highlights of the 2022 Pwnie Awards
Since 2007, the Pwnies have celebrated the good, the bad, and the wacky in cybersecurity. Enjoy some of the best moments of this year's ceremony.
September 16, 2022
Since 2007, the Pwnies have celebrated the good, the bad, and the wacky in cybersecurity. Enjoy some of the best moments of this year's ceremony.
by Karen Spiegelman, Features Editor
September 16, 2022
12 MIN READ
Slideshow
8 Hot Summer Fiction Reads for Cybersecurity Pros
A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.
July 27, 2022
A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.
by Steve Zurier, Contributing Writer, Dark Reading
July 27, 2022
6 MIN READ
Slideshow
7 Ways to Avoid Worst-Case Cyber Scenarios
In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.
June 21, 2022
In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.
by Sakshi Udavant, Freelance Writer
June 21, 2022
7 MIN READ
Slideshow
7 Ways to Bring AI to Cybersecurity
Academic researchers are developing projects to apply artificial intelligence to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from the C3.ai Digital Transformation Institute.
June 15, 2022
Academic researchers are developing projects to apply artificial intelligence to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from the C3.ai Digital Transformation Institute.
by Shannon Flynn, Contributing Writer
June 15, 2022
9 MIN READ
Slideshow
10 No-BS Tips for Building a Diverse and Dynamic Security Team
Advice from women and nonbinary security leaders on creating well-rounded security teams, stronger CISO leadership, and a more resilient industry.
June 01, 2022
Advice from women and nonbinary security leaders on creating well-rounded security teams, stronger CISO leadership, and a more resilient industry.
by Ericka Chickowski, Contributing Writer, Dark Reading
June 01, 2022
16 MIN READ
Slideshow