Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

SSRF 101: How Server-Side Request Forgery Sneaks Past Your Web Apps

Server-side request forgery is a dangerous attack method that is also becoming an issue for the cloud. Here are some of the basics to help keep your Web server from turning against you. more >
Slide Show

10 Tough Questions CEOs Are Asking CISOs

See more featured articles from THE EDGE
THE EDGE Threat Monitor
AppSec Concerns Drove 61% of Businesses to Change Applications

Some have even left behind commercial software and migrated to open source or in-house homegrown applications. Continue for synopsis or read full research report.
See more reports from THE EDGE THREAT MONITOR
What Are Some Basic Ways to Protect My Global Supply Chain?

Rick Holland, CISO, Digital Shadows: Assessing supply chains is one of the more challenging third-party risk management endeavors organizations can take on. ...

1  responses
What Is a Privileged Access Workstation (PAW)?

Tal Zamir, co-founder and CEO of Hysolate: Workstations used by privileged users can easily become an attacker's shortcut into the heart of the enterprise. ...

0  responses
What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?

Kurtis Minder, CEO of GroupSense: There are a number of tools that are available to look for misconfigured or open S3 buckets. Most of these tools are available for free ...

1  responses
See more questions and answers from ASK THE EXPERTS
Flash Poll
Name That Toon: Private (Button) Eye