Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Edge Articles
Page 1 / 2   >   >>
A Beginner's Guide to Microsegmentation
Feature  |  9/20/2019  | 
In a world in which the data center perimeter has all but evaporated, traditional segmentation no longer is enough. Enter microsegmentation. Here's what organizations need to do to maximize the benefits of this improved security architecture.
The 20 Worst Metrics in Cybersecurity
Feature  |  9/19/2019  | 
Security leaders are increasingly making their case through metrics, as well they should as long as they're not one of these.
The Top 'Human Hacks' to Watch For Now
Feature  |  9/18/2019  | 
Social engineering is as old as mankind. But its techniques have evolved with time. Here are the latest tricks criminals are using to dupe end users.
Poll Results: Maybe Not Burned Out, But Definitely 'Well Done'
Feature  |  9/17/2019  | 
Staff shortages and increasingly challenging jobs are turning up the heat on security pros, readers say.
Get Smart
Feature  |  9/17/2019  | 
On a scale of 1 to 5, how 'smart' is your home?
How a PIA Can CYA
Feature  |  9/16/2019  | 
More than a compliance mandate, privacy impact assessments can also spot risks early in the product development cycle.
Escaping Email: Unlocking Message Security for SMS, WhatsApp
Feature  |  9/12/2019  | 
Messaging is growing in importance as dislike for email increases. That means knowing how to protect critical data in the messaging era is a must for IT security.
Community Projects Highlight Need for Security Volunteers
Feature  |  9/11/2019  | 
From university courses to open source self-starters, community software projects aim to solve problems for populations in need. A focus on security is required as well.
Security Pros' Painless Guide to Machine Intelligence, AI, ML & DL
Feature  |  9/10/2019  | 
Artificial intelligence, machine learning, or deep learning? Knowing what the major terms really mean will help you sort through the morass of words on the subject and the security uses of each.
Just a Few Questions Before That Bank Withdrawal ...
Feature  |  9/9/2019  | 
And be ready to turn over your first born.
Phishers' Latest Tricks for Reeling in New Victims
Feature  |  9/9/2019  | 
Phishing works because people are, by nature, trusting -- but these evolving phishing techniques make it even tougher for security managers to stay on top.
8 Ways to Spot an Insider Threat
Feature  |  9/6/2019  | 
The good news is most insider threats derive from negligence, not malicious intent. The bad news is the frequency of negligence is already ahead of where it was in 2018.
Meet FPGA: The Tiny, Powerful, Hackable Bit of Silicon at the Heart of IoT
Feature  |  9/5/2019  | 
Field-programmable gate arrays are flexible, agile-friendly components that populate many infrastructure and IoT devices and have recently become the targets of researchers finding vulnerabilities.
Cartoon Contest: Bedtime Stories
Feature  |  9/4/2019  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
'It Takes Restraint': A Seasoned CISO's Sage Advice for New CISOs
Feature  |  9/3/2019  | 
Todd Fitzgerald wrote the books on being a chief information security officer. Here he offers tips on what to do and what not to do in the first few months of a new CISO job.
'It Saved Our Community': 16 Realistic Ransomware Defenses for Cities
Feature  |  8/30/2019  | 
Practical steps municipal governments can take to better prevent and respond to ransomware infections.
Fuzzing 101: Why Bug Hunters Still Love It After All These Years
Feature  |  8/28/2019  | 
Fuzzing is one of the basic tools in a researcher's arsenal. Here are the things you should know about this security research foundational tool.
Never Forget Your Passwords Again!
Feature  |  8/28/2019  | 
You never know what those late-night infomercials are going to turn up.
The Right to Be Patched: How Sentient Robots Will Change InfoSec Management
Feature  |  8/27/2019  | 
It won't be long before we consider embodied AI as a form of "life" and that will have a variety of paradigm-shifting, somewhat irritating, and potentially hilarious impacts on the daily lives of infosec and privacy pros.
'Culture Eats Policy for Breakfast': Rethinking Security Awareness Training
Feature  |  8/26/2019  | 
What's definitely not working with end-user cybersecurity awareness training and what you can do about it.
Clogged Cache? The Edge Cartoon Contest Winners
Feature  |  8/23/2019  | 
Creativity flowed, but two captions rose to the top.
Haas Formula 1 CIO Builds Security at 230 Miles per Hour
Feature  |  8/22/2019  | 
As the CIO for both Formula 1 and NASCAR racing teams, Gary Foote is tackling the same security issues as other manufacturing CIOs with a huge dash of motorized mayhem thrown in.
How to Avoid Technical Debt in Open Source Projects
Feature  |  8/21/2019  | 
Engineering teams have only a certain amount of capacity. Cutting down the volume of rework inherent in the open source business model begins with three best practices.
5 Ways to Improve the Patching Process
Feature  |  8/20/2019  | 
So many software vulnerabilities, so little time. But failure to patch them can have serious consequences. Here's help for overwhelmed security teams.
Modern Technology, Modern Mistakes
Feature  |  8/19/2019  | 
As employees grow more comfortable using new technologies, they could inadvertently be putting their enterprises at risk. And that leaves security teams having to defend an ever-expanding attack surface.
Compliance Training? What Compliance Training?
Feature  |  8/19/2019  | 
Employees can run ... but they can't hide. Or can they?
5 Things to Know About Cyber Insurance
Feature  |  8/15/2019  | 
More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy.
You Gotta Reach 'Em to Teach 'Em
Feature  |  8/14/2019  | 
As threats continue to evolve and cybercriminals become more sophisticated, organizations that lack a mature security awareness and training program place themselves at serious risk.
Moving on Up: Ready for Your Apps to Live in the Cloud?
Feature  |  8/13/2019  | 
Among the complications: traditional security tools work poorly or not at all in the cloud, and if a company screws up, the whole Internet will know.
Modern-Day SOCs: People, Process & Technology
Feature  |  8/12/2019  | 
As businesses look to the future and invest in next-generation tools, here are some considerations for more effective planning.
Slow Your Roll Before Disclosing a Security Incident
Feature  |  8/8/2019  | 
Transparency rules, but taking the right amount of time to figure out what happened will go a long way toward setting the record straight.
Securing DevOps Is About People and Culture
Feature  |  8/6/2019  | 
Preconceived notions and divisions make building security into the software development life cycle an uphill battle for many organizations.
Hollywood-Style Hacker Fight
Feature  |  8/6/2019  | 
Watch movies much? Here's what happens when two hackers try to outhack each other.
How to Keep Your Web Servers Secure
Feature  |  8/5/2019  | 
The good news is that Web servers have come a long way in terms of security. But to err is human, even for IT and security people.
Why Every Organization Needs an Incident Response Plan
Feature  |  8/2/2019  | 
OK, perhaps that's obvious. The question is, how come so many organizations still wait for something to happen to trigger their planning?
A Realistic Path Forward for Security Orchestration and Automation
Feature  |  8/1/2019  | 
Security teams often look to technology to solve their security challenges. Yet sometimes investing in new products can create more issues.
Keep Your Eye on Digital Certificates
Feature  |  7/31/2019  | 
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
Farewell, Dear Password? The Future of Identity and Authorization
Feature  |  7/30/2019  | 
Many organizations are questioning whether eliminating passwords as an authentication tool would augment their overall security posture.
A Security-First Approach to DevOps
Feature  |  7/29/2019  | 
Aware of the risks inherent in software, businesses are recognizing the need for application security.
What Every Security Team Should Know About Internet Threats
Feature  |  7/26/2019  | 
Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.
How to Create Smarter Risk Assessments
Feature  |  7/25/2019  | 
Executives and directors need quantitative measurements such as likelihood of loss and hard-dollar financial impact to make more informed decisions about security risks.
VPNs' Future: Less Reliant on Users, More Transparent, And Smarter
Feature  |  7/24/2019  | 
Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the IoT need protection.
Travel Security [from J4vv4D]
Feature  |  7/24/2019  | 
Do you travel to dangerous places, like Information Security Conferences?
DHS's Bob Kolasky Goes All in on Risk Management
Feature  |  7/23/2019  | 
As director of the DHS's National Risk Management Center, measuring and managing risk for critical infrastructure across 16 industrial sectors, Kolasky stands at a busy crossroads.
Planning a Bug Bounty Program? Follow Shopify's Example
Feature  |  7/22/2019  | 
Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.
Security Considerations in a BYOD Culture
Feature  |  7/19/2019  | 
The 'bring your own device' movement has put security pros on high alert for a new breed of predator who is on the hunt to find ways to exploit the ever-expanding attack surface.
The Truth About Vulnerabilities in Open Source Code
Feature  |  7/18/2019  | 
Turns out the problem isn't with the code itself, experts say.
The 10 Essentials of Infosec Forensics
Feature  |  7/17/2019  | 
Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.
GDPR: The Good, the Bad, and the Uncertain
Feature  |  7/16/2019  | 
One year post-GDPR implementation it's time to ask the tough question of whether companies are celebrating or cursing these consumer privacy mandates.
Page 1 / 2   >   >>

A Virus Walks Into a Bar ...

Source: FORA.tv 

What security-related videos have made you laugh? Let us know! Send them to [email protected].

Cartoon Contest: Bedtime Stories
Flash Poll