informa

The Edge

How Do I Reduce Security Tool Sprawl in My Environment?
When it comes to tool consolidation, focus on platforms over products.
June 01, 2023
When it comes to tool consolidation, focus on platforms over products.
by Yotam Segev, Co-Founder and CEO, Cyera
June 01, 2023
3 MIN READ
Article
Ways to Help Cybersecurity's Essential Workers Avoid Burnout
To support and retain the people who protect assets against bad actors, organizations should create a more defensible environment.
May 31, 2023
To support and retain the people who protect assets against bad actors, organizations should create a more defensible environment.
by Kris Lovejoy, Global Security and Resilience Practice Leader, Kyndryl
May 31, 2023
4 MIN READ
Article
Spotlight on 2023 Dan Kaminsky Fellow: Dr. Gus Andrews
As the second Kaminsky Fellow, Andrews will study the use of threat intelligence to track campaigns against the human rights community.
May 31, 2023
As the second Kaminsky Fellow, Andrews will study the use of threat intelligence to track campaigns against the human rights community.
by Ericka Chickowski, Contributing Writer, Dark Reading
May 31, 2023
11 MIN READ
Article
Russia's War in Ukraine Shows Cyberattacks Can Be War Crimes
Ukraine head of cybersecurity Victor Zhora says the world needs "efficient legal instruments to confront cyber terrorism."
May 26, 2023
Ukraine head of cybersecurity Victor Zhora says the world needs "efficient legal instruments to confront cyber terrorism."
by Andrada Fiscutean, Contributing Writer, Dark Reading
May 26, 2023
4 MIN READ
Article
What Security Professionals Need to Know About Aggregate Cyber-Risk
Widespread cyber incidents will happen, but unlike natural disasters, specific security controls can help prevent a catastrophe.
May 23, 2023
Widespread cyber incidents will happen, but unlike natural disasters, specific security controls can help prevent a catastrophe.
by Tiago Henriques, Vice President of Research, Coalition
May 23, 2023
4 MIN READ
Article
Improving Cybersecurity Requires Building Better Public-Private Cooperation
Security vendors, businesses, and US government agencies need to work together to fight ransomware and protect critical infrastructure.
May 22, 2023
Security vendors, businesses, and US government agencies need to work together to fight ransomware and protect critical infrastructure.
by Sue Poremba, Contributing Writer
May 22, 2023
6 MIN READ
Article
Data Siloes: Overcoming the Greatest Challenge in SecOps
It's not lack of data that's the problem, but the inability to piece it together to truly understand and reduce risk.
May 19, 2023
It's not lack of data that's the problem, but the inability to piece it together to truly understand and reduce risk.
by Allen Rogers, Co-founder & Chief Product Officer, Noetic Cyber
May 19, 2023
4 MIN READ
Article
5 Ways Security Testing Can Aid Incident Response
Organizations can focus on these key considerations to develop their cybersecurity testing programs sustainably.
May 17, 2023
Organizations can focus on these key considerations to develop their cybersecurity testing programs sustainably.
by David Dunn, Senior Managing Director and Head of EMEA Cybersecurity, FTI Consulting
May 17, 2023
5 MIN READ
Article
Generative AI Empowers Users but Challenges Security
With the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.
May 15, 2023
With the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.
by Michael Bargury, CTO & Co-Founder, Zenity
May 15, 2023
3 MIN READ
Article
Making Sure Lost Data Stays Lost
Retired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.
May 12, 2023
Retired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.
by Stephen Lawton, Contributing Writer
May 12, 2023
5 MIN READ
Article
How Boards Can Set Enforceable Cyber Risk Tolerance Levels
Boards love to say they have low risk tolerance, but are they willing to make the expensive and painful decisions to make it truly happen?
May 11, 2023
Boards love to say they have low risk tolerance, but are they willing to make the expensive and painful decisions to make it truly happen?
by Evan Schuman, Contributing Writer, Dark Reading
May 11, 2023
4 MIN READ
Article
Why the 'Why' of a Data Breach Matters
The motivations of an attacker help establish what protections to put into place to protect assets.
May 08, 2023
The motivations of an attacker help establish what protections to put into place to protect assets.
by Joshua Goldfarb, Security and Fraud Architect, F5
May 08, 2023
4 MIN READ
Article
Attackers Route Malware Activity Over Popular CDNs
One way to hide malicious activity is to make it look benign by blending in with regular traffic passing through content delivery networks (CDNs) and cloud service providers, according to a Netskope report.
May 05, 2023
One way to hide malicious activity is to make it look benign by blending in with regular traffic passing through content delivery networks (CDNs) and cloud service providers, according to a Netskope report.
by Edge Editors, Dark Reading
May 05, 2023
1 MIN READ
Article
Identifying Compromised Data Can Be a Logistical Nightmare
Being able to trace an incident backward from breach to data source is vital in restoring and improving cybersecurity.
May 04, 2023
Being able to trace an incident backward from breach to data source is vital in restoring and improving cybersecurity.
by Stephen Lawton, Contributing Writer
May 04, 2023
5 MIN READ
Article
What's the Secret to Finding the Next Big Thing in Cybersecurity?
Varun Badhwar, who has brought each of the three startups he founded to the finals of the RSAC Innovation Sandbox, talks about how to see around the corner.
May 03, 2023
Varun Badhwar, who has brought each of the three startups he founded to the finals of the RSAC Innovation Sandbox, talks about how to see around the corner.
by Karen Spiegelman, Features Editor
May 03, 2023
4 MIN READ
Article