informa

The Edge

San Francisco Rolls Back Its Plan for Killer Robots
After an uproar, the city board voted to rescind last week's bill to allow police to use robots to deliver deadly force. The fight isn't over, but there's a good reason it should be.
December 07, 2022
After an uproar, the city board voted to rescind last week's bill to allow police to use robots to deliver deadly force. The fight isn't over, but there's a good reason it should be.
by Karen Spiegelman, Features Editor
December 07, 2022
6 MIN READ
Article
Name That Edge Toon: Not Your Average Bear
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
December 06, 2022
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
December 06, 2022
1 MIN READ
Article
Cybersecurity Should Focus on Managing Risk
Preventing all data breaches is an unrealistic goal. Instead, focus on finding and minimizing the greatest risks.
December 05, 2022
Preventing all data breaches is an unrealistic goal. Instead, focus on finding and minimizing the greatest risks.
by Tiago Henriques, Director of Engineering, Coalition
December 05, 2022
4 MIN READ
Article
Concern Over DDoS Attacks Falls Despite Rise in Incidents
Almost a third of respondents in Fastly's "Fight Fire with Fire" survey view data breaches and data loss as the biggest cybersecurity threat.
December 02, 2022
Almost a third of respondents in Fastly's "Fight Fire with Fire" survey view data breaches and data loss as the biggest cybersecurity threat.
by Edge Editors, Dark Reading
December 02, 2022
2 MIN READ
Article
API Secrets: Where the Bearer Model Breaks Down
Current authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.
November 30, 2022
Current authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.
by Anusha Iyer, President, CTO, and Co-Founder, Corsha
November 30, 2022
4 MIN READ
Article
How to Use Cyber Deception to Counter an Evolving and Advanced Threat Landscape
Organizations must be prepared to root out bad actors by any means possible, even if it means setting traps and stringing lures.
November 29, 2022
Organizations must be prepared to root out bad actors by any means possible, even if it means setting traps and stringing lures.
by Edith Peña, Senior Lead Technologist, Booz Allen Hamilton
November 29, 2022
4 MIN READ
Article
How the Cloud Changed Digital Forensics Investigations
The enterprise's shift to the cloud means digital forensics investigators have had to adopt new remote techniques and develop custom tools to uncover and process evidence off compromised devices.
November 29, 2022
The enterprise's shift to the cloud means digital forensics investigators have had to adopt new remote techniques and develop custom tools to uncover and process evidence off compromised devices.
by Stephen Lawton, Contributing Writer
November 29, 2022
4 MIN READ
Article
Why Africa's Telecoms Must Actively Collaborate to Combat Fraud
Unique conditions contribute to outsized telecom fraud across the continent, but working together can bring solutions.
November 23, 2022
Unique conditions contribute to outsized telecom fraud across the continent, but working together can bring solutions.
by Kolawole Samuel Adebayo, Contributing Writer
November 23, 2022
4 MIN READ
Article
Cyber Due Diligence in M&As Uncovers Threats, Improves Valuations
To get the full picture, companies need to look into the cybersecurity history and practices of the business they're acquiring.
November 22, 2022
To get the full picture, companies need to look into the cybersecurity history and practices of the business they're acquiring.
by Stephen Lawton, Contributing Writer
November 22, 2022
4 MIN READ
Article
Major Security Breach From Business Users' Low-Code Apps Could Come in 2023, Analysts Warn
Here's what that means about our current state as an industry, and why we should be happy about it.
November 21, 2022
Here's what that means about our current state as an industry, and why we should be happy about it.
by Michael Bargury, CTO & Co-Founder, Zenity
November 21, 2022
5 MIN READ
Article
Amid Legal Fallout, Cyber Insurers Redefine State-Sponsored Attacks as Act of War
As carriers rewrite their act-of-war exclusions following the NotPetya settlement between Mondelez and Zurich, organizations should read their cyber insurance policies carefully to see what is still covered.
November 18, 2022
As carriers rewrite their act-of-war exclusions following the NotPetya settlement between Mondelez and Zurich, organizations should read their cyber insurance policies carefully to see what is still covered.
by Stephen Lawton, Contributing Writer
November 18, 2022
5 MIN READ
Article
Analysts Welcome NSA's Advice for Developers to Adopt Memory-Safe Languages
Languages such as C and C++ rely too heavily on the programmer not making simple memory-related security errors.
November 17, 2022
Languages such as C and C++ rely too heavily on the programmer not making simple memory-related security errors.
by Jai Vijayan, Contributing Writer, Dark Reading
November 17, 2022
5 MIN READ
Article
Are We Ready for AI-Generated Code?
Autocompleted code is convenient and quick, but it may expose your organization to security and compliance risks.
November 16, 2022
Autocompleted code is convenient and quick, but it may expose your organization to security and compliance risks.
by Frank Catucci, Chief Technology Officer and Head of Security Research, Invicti
November 16, 2022
6 MIN READ
Article
Modern CISO: More Than a Security Officer
YL Ventures CISO-in-residence Frank Kim weighs in on the top security concerns facing CISOs in a Dark Reading interview.
November 15, 2022
YL Ventures CISO-in-residence Frank Kim weighs in on the top security concerns facing CISOs in a Dark Reading interview.
by Edge Editors, Dark Reading
November 15, 2022
6 MIN READ
Article
How APIs and Applications Can Live Happily Ever After
Solutions that allow businesses to reduce complexity, develop and deploy applications and APIs, and protect those applications and APIs are no fairy tale.
November 14, 2022
Solutions that allow businesses to reduce complexity, develop and deploy applications and APIs, and protect those applications and APIs are no fairy tale.
by Joshua Goldfarb, Fraud Solutions Architect - EMEA and APCJ, F5
November 14, 2022
5 MIN READ
Article