All
Supporting Women in InfoSec
Dark Reading Videos | 8/5/2020 | Maxine Holt, senior research director from Omdia, explains why the time is right for women to step into more cybersecurity jobs.
Russian Election Interference: What’s Next?
Nate Beach-Westmoreland gives a look back at the past 10 years of Russian election interference and disinformation campaigns. What can we learn from the past and what should we expect as the 2020 US presidential election approaches?
Beyond Burnout: What Is Cybersecurity Doing to Us?
Edge-DRsplash-10-edge-articles | 3/13/2020 | Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.
Wendy Nather on How to Make Security 'Democratization' a Reality
Edge-DRsplash-10-edge-articles | 2/25/2020 | Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users -- and start sharing control with them.
Martin and Dorothie Hellman on Love, Crypto & Saving the World
Edge-DRsplash-10-edge-articles | 2/15/2020 | Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth.
The Next Security Silicon Valley: Coming to a City Near You?
Edge-DRsplash-10-edge-articles | 12/11/2019 | The high cost of doing business in California's San Francisco Bay Area is just one factor driving infosec companies — established and and startups, alike — to pursue their fortunes elsewhere. Here's where many are going.
What's in a WAF?
Edge-DRsplash-10-edge-articles | 11/20/2019 | Need a 101 lesson on Web application firewalls? Here's your crib sheet on what a WAF is, how it works, and what to look for when you're in the market for a new solution.
UVA Defeats UMBC, in Stunning Upset
In first trip to Mid-Atlantic Collegiate Cyber Defense Competition, University of Virginia's Cyber Defense Team defeats reigning national champs from University of Maryland, Baltimore County.
We're Still Not Ready for GDPR? What is Wrong With Us?
Commentary | 11/17/2017 | The canary in the coalmine died 12 years ago, the law went into effect 19 months ago, but many organizations still won't be ready for the new privacy regulations when enforcement begins in May.
How Security Metrics Fail Us & How We Fail Them
Dark Reading Videos | 9/26/2017 | Joseph Carson of Thycotic discusses how infosec professionals buy security products they don't need and make other bad decisions, because of poor use of metrics.
Attacking Developers Using 'Shadow Containers'
Dark Reading Videos | 9/15/2017 | Sagie Dulce describes why developers are such attractive targets and how the Docker API can be exploited to use one of developers' favorite tools against them in sneaky, obfuscated attacks.
Tesla Hacks: The Good, The Bad, & The Ugly
Dark Reading Videos | 9/12/2017 | Keen Security Lab found multiple holes in the isolation layer Tesla uses to protect drive systems from infotainment systems, but were impressed by the auto company's security in other ways.
Mikko Hypponen's Vision of the Cybersecurity Future
Dark Reading Videos | 9/4/2017 | Twenty years from now, will everything be in the Internet of Things, and if so, how does the security industry need to prepare? F-Secure's chief research officer weighs in on this and what else the future promises (and threatens).
Using Market Pressures to Improve Cybersecurity
Dark Reading Videos | 8/31/2017 | Post-MedSec, Chris Wysopal discusses what impact the investor community -- if not consumers -- can have on squashing vulnerabilities and improving cybersecurity.
The Active Directory Botnet
Dark Reading Videos | 8/30/2017 | It's a nightmare of an implementation error with no easy fix. Ty Miller and Paul Kalinin explain how and why an attacker could build an entire botnet inside your organization.
IoTCandyJar: A HoneyPot for any IoT Device
Dark Reading Videos | 8/29/2017 | Palo Alto Networks researchers explain how they designed an affordable, behavior-based honeypot to detect attacks on an IoT device -- any kind of IoT device.
Turning Sound Into Keystrokes: Skype & Type
Dark Reading Videos | 8/25/2017 | Don't let your fingers do the talking in a Skype session. The callers on the other end could know what you're writing, researcher Daniele Lain explains.
ShieldFS Hits 'Rewind' on Ransomware
Dark Reading Videos | 8/18/2017 | Federico Maggi and Andrea Continella discuss a new tool to protect filesystems by disrupting and undoing ransomware's encryption activities.
The Shadow Brokers: How They Changed 'Cyber Fear'
Dark Reading Videos | 8/17/2017 | At Black Hat USA, Matt Suiche, founder of Comae Technologies, describes what we know about the Shadow Brokers and how they have changed the business of cyber fear.
2016's 7 Worst DDoS Attacks So Far
Slideshows | 11/28/2016 | Rise of booter and stresser services, mostly run on IoT botnets, is fueling DDoS excitement (but the pros aren't impressed).
Happy 30th Birthday CFAA!
Slideshows | 10/14/2016 | Six things we still don’t know about the Computer Fraud and Abuse Act after all this time.
Researcher Roots Out Security Flaws In Insulin Pumps
Jay Radcliffe, researcher and diabetic who found the flaws in Johnson & Johnson Animas OneTouch Ping insulin pump, 'would not hesitate' to allow his own children be treated by the device if they were diabetic and advised to do so by physicians.
Cybercriminals' Superior Business Savvy Keeps Them Ahead
Dark Reading Videos | 9/30/2016 | Rick Holland of Digital Shadows explains how the attackers' superior business agility, faster change management, specialized job force, lower barriers to entry and bulletproof hosting keeps them ahead of the good guys.
Blogs
Supporting Women in InfoSec
Dark Reading Videos | 8/5/2020 | Maxine Holt, senior research director from Omdia, explains why the time is right for women to step into more cybersecurity jobs.
Russian Election Interference: What’s Next?
Nate Beach-Westmoreland gives a look back at the past 10 years of Russian election interference and disinformation campaigns. What can we learn from the past and what should we expect as the 2020 US presidential election approaches?
Beyond Burnout: What Is Cybersecurity Doing to Us?
Edge-DRsplash-10-edge-articles | 3/13/2020 | Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.
Wendy Nather on How to Make Security 'Democratization' a Reality
Edge-DRsplash-10-edge-articles | 2/25/2020 | Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users -- and start sharing control with them.
Martin and Dorothie Hellman on Love, Crypto & Saving the World
Edge-DRsplash-10-edge-articles | 2/15/2020 | Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth.
The Next Security Silicon Valley: Coming to a City Near You?
Edge-DRsplash-10-edge-articles | 12/11/2019 | The high cost of doing business in California's San Francisco Bay Area is just one factor driving infosec companies — established and and startups, alike — to pursue their fortunes elsewhere. Here's where many are going.
What's in a WAF?
Edge-DRsplash-10-edge-articles | 11/20/2019 | Need a 101 lesson on Web application firewalls? Here's your crib sheet on what a WAF is, how it works, and what to look for when you're in the market for a new solution.
UVA Defeats UMBC, in Stunning Upset
In first trip to Mid-Atlantic Collegiate Cyber Defense Competition, University of Virginia's Cyber Defense Team defeats reigning national champs from University of Maryland, Baltimore County.
We're Still Not Ready for GDPR? What is Wrong With Us?
Commentary | 11/17/2017 | The canary in the coalmine died 12 years ago, the law went into effect 19 months ago, but many organizations still won't be ready for the new privacy regulations when enforcement begins in May.
How Security Metrics Fail Us & How We Fail Them
Dark Reading Videos | 9/26/2017 | Joseph Carson of Thycotic discusses how infosec professionals buy security products they don't need and make other bad decisions, because of poor use of metrics.
Attacking Developers Using 'Shadow Containers'
Dark Reading Videos | 9/15/2017 | Sagie Dulce describes why developers are such attractive targets and how the Docker API can be exploited to use one of developers' favorite tools against them in sneaky, obfuscated attacks.
Tesla Hacks: The Good, The Bad, & The Ugly
Dark Reading Videos | 9/12/2017 | Keen Security Lab found multiple holes in the isolation layer Tesla uses to protect drive systems from infotainment systems, but were impressed by the auto company's security in other ways.
Mikko Hypponen's Vision of the Cybersecurity Future
Dark Reading Videos | 9/4/2017 | Twenty years from now, will everything be in the Internet of Things, and if so, how does the security industry need to prepare? F-Secure's chief research officer weighs in on this and what else the future promises (and threatens).
Using Market Pressures to Improve Cybersecurity
Dark Reading Videos | 8/31/2017 | Post-MedSec, Chris Wysopal discusses what impact the investor community -- if not consumers -- can have on squashing vulnerabilities and improving cybersecurity.
The Active Directory Botnet
Dark Reading Videos | 8/30/2017 | It's a nightmare of an implementation error with no easy fix. Ty Miller and Paul Kalinin explain how and why an attacker could build an entire botnet inside your organization.
IoTCandyJar: A HoneyPot for any IoT Device
Dark Reading Videos | 8/29/2017 | Palo Alto Networks researchers explain how they designed an affordable, behavior-based honeypot to detect attacks on an IoT device -- any kind of IoT device.
Turning Sound Into Keystrokes: Skype & Type
Dark Reading Videos | 8/25/2017 | Don't let your fingers do the talking in a Skype session. The callers on the other end could know what you're writing, researcher Daniele Lain explains.
ShieldFS Hits 'Rewind' on Ransomware
Dark Reading Videos | 8/18/2017 | Federico Maggi and Andrea Continella discuss a new tool to protect filesystems by disrupting and undoing ransomware's encryption activities.
The Shadow Brokers: How They Changed 'Cyber Fear'
Dark Reading Videos | 8/17/2017 | At Black Hat USA, Matt Suiche, founder of Comae Technologies, describes what we know about the Shadow Brokers and how they have changed the business of cyber fear.
2016's 7 Worst DDoS Attacks So Far
Slideshows | 11/28/2016 | Rise of booter and stresser services, mostly run on IoT botnets, is fueling DDoS excitement (but the pros aren't impressed).
Happy 30th Birthday CFAA!
Slideshows | 10/14/2016 | Six things we still don’t know about the Computer Fraud and Abuse Act after all this time.
Researcher Roots Out Security Flaws In Insulin Pumps
Jay Radcliffe, researcher and diabetic who found the flaws in Johnson & Johnson Animas OneTouch Ping insulin pump, 'would not hesitate' to allow his own children be treated by the device if they were diabetic and advised to do so by physicians.
Cybercriminals' Superior Business Savvy Keeps Them Ahead
Dark Reading Videos | 9/30/2016 | Rick Holland of Digital Shadows explains how the attackers' superior business agility, faster change management, specialized job force, lower barriers to entry and bulletproof hosting keeps them ahead of the good guys.
|