informa

The Edge

What Does a Chief Product Security Officer Do?
A CPSO bridges the gap between developers and security to ensure products are built securely and safely.
October 13, 2021
A CPSO bridges the gap between developers and security to ensure products are built securely and safely.
by Sean Nikkel, Senior Cyber Threat Intel Analyst, Digital Shadows
October 13, 2021
2 min read
Article
High-Profile Breaches Are Shifting Enterprise Security Strategy
Increased media attention is driving changes in enterprise security strategy -- some positive, some negative.
October 12, 2021
Increased media attention is driving changes in enterprise security strategy -- some positive, some negative.
by Edge Editors, Dark Reading
October 12, 2021
1 min read
Article
7 Smart Ways a Security Team Can Win Stakeholder Trust
By demonstrating the following behaviors, security teams can more effectively move their initiatives forward.
October 11, 2021
By demonstrating the following behaviors, security teams can more effectively move their initiatives forward.
by Joshua Goldfarb, Director of Product Management at F5
October 11, 2021
4 min read
Article
What Are Some Red Flags in a Vendor Security Assessment?
The last thing you want is a vendor that lies to you about its security practices.
October 07, 2021
The last thing you want is a vendor that lies to you about its security practices.
by John Bambenek, Principal Threat Hunter, Netenrich
October 07, 2021
2 min read
Article
MacOS Security: What Security Teams Should Know
As more macOS patches emerge and cybercriminals and nation-states take aim at the platform, experts discuss how macOS se...
October 06, 2021
As more macOS patches emerge and cybercriminals and nation-states take aim at the platform, experts discuss how macOS se...
by Kelly Sheridan, Senior Editor
October 06, 2021
10 min read
Article
Loss of Intellectual Property, Customer Data Pose Greatest Business Risks
The slightly "good" news? Security professionals are a little less concerned about certain threats than last year, accor...
October 05, 2021
The slightly "good" news? Security professionals are a little less concerned about certain threats than last year, accor...
by Edge Editors, Dark Reading
October 05, 2021
2 min read
Article
Name That Edge Toon: Mobile Monoliths
Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift ...
October 04, 2021
Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift ...
October 04, 2021
1 min read
Article
Why Windows Print Spooler Remains a Big Attack Target
Despite countless vulnerabilities and exploits, the legacy Windows printing process service continues to be an attack su...
October 01, 2021
Despite countless vulnerabilities and exploits, the legacy Windows printing process service continues to be an attack su...
by Jai Vijayan, Contributing Writer
October 01, 2021
6 min read
Article
10 Recent Examples of How Insider Threats Can Cause Big Breaches and Damage
Theft of intellectual property, sabotage, exposure of sensitive data and more were caused by malicious behavior and negl...
September 30, 2021
Theft of intellectual property, sabotage, exposure of sensitive data and more were caused by malicious behavior and negl...
by Ericka Chickowski, Contributing Writer
September 30, 2021
1 min read
Slideshow
Why Should I Care About HTTP Request Smuggling?
HTTP request smuggling is a growing vulnerability, but you can manage the risk with proper server configuration.
September 29, 2021
HTTP request smuggling is a growing vulnerability, but you can manage the risk with proper server configuration.
by Asaf Karas, CTO. JFrog Security
September 29, 2021
2 min read
Article
Outsourced Software Poses Greater Risks to Enterprise Application Security
In the wake of SolarWinds and other third-party attacks, security teams worry that outsourced applications pose risks to...
September 28, 2021
In the wake of SolarWinds and other third-party attacks, security teams worry that outsourced applications pose risks to...
by Edge Editors, Dark Reading
September 28, 2021
2 min read
Article
7 Ways to Thwart Malicious Insiders
Malicious insider incidents may be less frequent than inadvertent user missteps, but they can cost organizations big tim...
September 27, 2021
Malicious insider incidents may be less frequent than inadvertent user missteps, but they can cost organizations big tim...
by Steve Zurier, Contributing Writer
September 27, 2021
1 min read
Slideshow
What Is the Difference Between Security and Resilience?
Resilience shifts the focus toward eliminating the probable impact of the full attack chain.
September 24, 2021
Resilience shifts the focus toward eliminating the probable impact of the full attack chain.
by Tim Wade, Technical Director, CTO Team, Vectra
September 24, 2021
2 min read
Article
Primer: Microsoft Active Directory Security for AD Admins
Nearly all AD environments are vulnerable to identity attack paths -- a powerful, widespread, and difficult-to-detect at...
September 23, 2021
Nearly all AD environments are vulnerable to identity attack paths -- a powerful, widespread, and difficult-to-detect at...
by Andy Robbins, Technical Architect, SpecterOps
September 23, 2021
4 min read
Article
Cisco Secure's TK Keanini on Achieving Better Security Outcomes
The latest installment of Edge Chats focuses on how security teams can achieve better security outcomes with an open pla...
September 23, 2021
The latest installment of Edge Chats focuses on how security teams can achieve better security outcomes with an open pla...
by Edge Editors, Dark Reading
September 23, 2021
1 min read
Video