informa

Slideshow

8 Hot Summer Fiction Reads for Cybersecurity Pros
A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.
July 27, 2022
A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.
by Steve Zurier, Contributing Writer, Dark Reading
July 27, 2022
1 min read
Slideshow
7 Ways to Avoid Worst-Case Cyber Scenarios
In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.
June 21, 2022
In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.
by Sakshi Udavant, Freelance Writer
June 21, 2022
1 min read
Slideshow
Top 6 Security Threats Targeting Remote Workers
Remote work is here to stay, which means security teams must ensure that security extends beyond corporate devices and protects employees wherever they are.
May 11, 2022
Remote work is here to stay, which means security teams must ensure that security extends beyond corporate devices and protects employees wherever they are.
by Sakshi Udavant, Freelance Writer
May 11, 2022
1 min read
Slideshow
How to Create a Cybersecurity Mentorship Program
As the talent shortage rages on, companies have found mentorship programs to be one of the best ways to obtain the security skills they need to develop their existing teams.
May 03, 2022
As the talent shortage rages on, companies have found mentorship programs to be one of the best ways to obtain the security skills they need to develop their existing teams.
by Steve Zurier, Contributing Writer, Dark Reading
May 03, 2022
1 min read
Slideshow
6 Malware Tools Designed to Disrupt Industrial Control Systems (ICS)
Stuxnet was the first known malware built to attack operational technology environment. Since then, there have been several others.
April 20, 2022
Stuxnet was the first known malware built to attack operational technology environment. Since then, there have been several others.
by Jai Vijayan, Contributing Writer, Dark Reading
April 20, 2022
1 min read
Slideshow
Creating a Security Culture Where People Can Admit Mistakes
In cybersecurity, user error is the symptom, not the disease. A healthy culture acknowledges and addresses the underlying causes of lapses.
April 11, 2022
In cybersecurity, user error is the symptom, not the disease. A healthy culture acknowledges and addresses the underlying causes of lapses.
by Karen Spiegelman, Features Editor
April 11, 2022
1 min read
Slideshow
Beware of These 5 Tax Scams
Fraudsters are out in full force as Tax Day approaches. Use this list to keep your company’s employees informed on what to watch out for this year.
April 04, 2022
Fraudsters are out in full force as Tax Day approaches. Use this list to keep your company’s employees informed on what to watch out for this year.
by Steve Zurier, Contributing Writer, Dark Reading
April 04, 2022
1 min read
Slideshow
6 Reasons Not to Pay Ransomware Attackers
Paying a ransom might appear to be the best option, but it comes with its own costs.
March 17, 2022
Paying a ransom might appear to be the best option, but it comes with its own costs.
by Jai Vijayan, Contributing Writer, Dark Reading
March 17, 2022
1 min read
Slideshow
8 More Women in Security You May Not Know but Should
Dark Reading highlights women who are quietly changing the game in cybersecurity. We also revisit some of those we've spoken to in the past to see what they're up to now.
March 08, 2022
Dark Reading highlights women who are quietly changing the game in cybersecurity. We also revisit some of those we've spoken to in the past to see what they're up to now.
by Ericka Chickowski, Contributing Writer, Dark Reading
March 08, 2022
1 min read
Slideshow
7 Ways to Secure Collaboration Tools in Your Organization
The push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
March 02, 2022
The push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
by Steve Zurier, Contributing Writer, Dark Reading
March 02, 2022
1 min read
Slideshow
8 of the Biggest Cybersecurity M&As & Investment Deals in 2021
There were more financial deals in cybersecurity last year than in any previous year.
February 14, 2022
There were more financial deals in cybersecurity last year than in any previous year.
by Jai Vijayan, Contributing Writer, Dark Reading
February 14, 2022
1 min read
Slideshow
8 Security Dinosaurs and What Filled Their Footprints
Security technology has to evolve as new threats emerge and defenses improve. Here is a look back at the old breeds that are dying out.
February 02, 2022
Security technology has to evolve as new threats emerge and defenses improve. Here is a look back at the old breeds that are dying out.
by Ericka Chickowski, Contributing Writer, Dark Reading
February 02, 2022
1 min read
Slideshow
7 Privacy Tips for Security Pros
How best to integrate privacy into your organization's security program.
January 31, 2022
How best to integrate privacy into your organization's security program.
by Steve Zurier, Contributing Writer, Dark Reading
January 31, 2022
1 min read
Slideshow
8 Security Startups to Watch in 2022
Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.
January 25, 2022
Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.
by Kelly Sheridan, Senior Editor
January 25, 2022
1 min read
Slideshow
7 of the Most Impactful Cybersecurity Incidents of 2021
There was a lot to learn from breaches, vulnerabilities, and attacks this year.
December 23, 2021
There was a lot to learn from breaches, vulnerabilities, and attacks this year.
by Jai Vijayan, Contributing Writer, Dark Reading
December 23, 2021
1 min read
Slideshow