The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
The Edge
How Do I Reduce Security Tool Sprawl in My Environment?
When it comes to tool consolidation, focus on platforms over products.
June 01, 2023
When it comes to tool consolidation, focus on platforms over products.
by Yotam Segev, Co-Founder and CEO, Cyera
June 01, 2023
3 MIN READ
Article
Ways to Help Cybersecurity's Essential Workers Avoid Burnout
To support and retain the people who protect assets against bad actors, organizations should create a more defensible environment.
May 31, 2023
To support and retain the people who protect assets against bad actors, organizations should create a more defensible environment.
by Kris Lovejoy, Global Security and Resilience Practice Leader, Kyndryl
May 31, 2023
4 MIN READ
Article
Spotlight on 2023 Dan Kaminsky Fellow: Dr. Gus Andrews
As the second Kaminsky Fellow, Andrews will study the use of threat intelligence to track campaigns against the human rights community.
May 31, 2023
As the second Kaminsky Fellow, Andrews will study the use of threat intelligence to track campaigns against the human rights community.
by Ericka Chickowski, Contributing Writer, Dark Reading
May 31, 2023
11 MIN READ
Article
Russia's War in Ukraine Shows Cyberattacks Can Be War Crimes
Ukraine head of cybersecurity Victor Zhora says the world needs "efficient legal instruments to confront cyber terrorism."
May 26, 2023
Ukraine head of cybersecurity Victor Zhora says the world needs "efficient legal instruments to confront cyber terrorism."
by Andrada Fiscutean, Contributing Writer, Dark Reading
May 26, 2023
4 MIN READ
Article
What Security Professionals Need to Know About Aggregate Cyber-Risk
Widespread cyber incidents will happen, but unlike natural disasters, specific security controls can help prevent a catastrophe.
May 23, 2023
Widespread cyber incidents will happen, but unlike natural disasters, specific security controls can help prevent a catastrophe.
by Tiago Henriques, Vice President of Research, Coalition
May 23, 2023
4 MIN READ
Article
Improving Cybersecurity Requires Building Better Public-Private Cooperation
Security vendors, businesses, and US government agencies need to work together to fight ransomware and protect critical infrastructure.
May 22, 2023
Security vendors, businesses, and US government agencies need to work together to fight ransomware and protect critical infrastructure.
by Sue Poremba, Contributing Writer
May 22, 2023
6 MIN READ
Article
Data Siloes: Overcoming the Greatest Challenge in SecOps
It's not lack of data that's the problem, but the inability to piece it together to truly understand and reduce risk.
May 19, 2023
It's not lack of data that's the problem, but the inability to piece it together to truly understand and reduce risk.
by Allen Rogers, Co-founder & Chief Product Officer, Noetic Cyber
May 19, 2023
4 MIN READ
Article
5 Ways Security Testing Can Aid Incident Response
Organizations can focus on these key considerations to develop their cybersecurity testing programs sustainably.
May 17, 2023
Organizations can focus on these key considerations to develop their cybersecurity testing programs sustainably.
by David Dunn, Senior Managing Director and Head of EMEA Cybersecurity, FTI Consulting
May 17, 2023
5 MIN READ
Article
Generative AI Empowers Users but Challenges Security
With the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.
May 15, 2023
With the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.
by Michael Bargury, CTO & Co-Founder, Zenity
May 15, 2023
3 MIN READ
Article
Making Sure Lost Data Stays Lost
Retired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.
May 12, 2023
Retired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.
by Stephen Lawton, Contributing Writer
May 12, 2023
5 MIN READ
Article
How Boards Can Set Enforceable Cyber Risk Tolerance Levels
Boards love to say they have low risk tolerance, but are they willing to make the expensive and painful decisions to make it truly happen?
May 11, 2023
Boards love to say they have low risk tolerance, but are they willing to make the expensive and painful decisions to make it truly happen?
by Evan Schuman, Contributing Writer, Dark Reading
May 11, 2023
4 MIN READ
Article
Why the 'Why' of a Data Breach Matters
The motivations of an attacker help establish what protections to put into place to protect assets.
May 08, 2023
The motivations of an attacker help establish what protections to put into place to protect assets.
by Joshua Goldfarb, Security and Fraud Architect, F5
May 08, 2023
4 MIN READ
Article
Attackers Route Malware Activity Over Popular CDNs
One way to hide malicious activity is to make it look benign by blending in with regular traffic passing through content delivery networks (CDNs) and cloud service providers, according to a Netskope report.
May 05, 2023
One way to hide malicious activity is to make it look benign by blending in with regular traffic passing through content delivery networks (CDNs) and cloud service providers, according to a Netskope report.
by Edge Editors, Dark Reading
May 05, 2023
1 MIN READ
Article
Identifying Compromised Data Can Be a Logistical Nightmare
Being able to trace an incident backward from breach to data source is vital in restoring and improving cybersecurity.
May 04, 2023
Being able to trace an incident backward from breach to data source is vital in restoring and improving cybersecurity.
by Stephen Lawton, Contributing Writer
May 04, 2023
5 MIN READ
Article
What's the Secret to Finding the Next Big Thing in Cybersecurity?
Varun Badhwar, who has brought each of the three startups he founded to the finals of the RSAC Innovation Sandbox, talks about how to see around the corner.
May 03, 2023
Varun Badhwar, who has brought each of the three startups he founded to the finals of the RSAC Innovation Sandbox, talks about how to see around the corner.
by Karen Spiegelman, Features Editor
May 03, 2023
4 MIN READ
Article