Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Edge Articles
Page 1 / 2   >   >>
14 Hot Cybersecurity Certifications Right Now
Feature  |  10/15/2019  | 
In an industry where certifications can make or break a job candidacy, which ones have security pros been going after in 2019?
A Murderers' Row of Poisoning Attacks
Feature  |  10/11/2019  | 
Poisoning can be used against network infrastructure and applications. Understanding how DNS cache poisoning, machine learning model poisoning, and other attacks work can help you prepare the proper antidote.
Creative Wi-Fi Passwords
Feature  |  10/11/2019  | 
Let's see a hacker figure out one of these.
Works of Art: Cybersecurity Inspires 6 Winning Ideas
Feature  |  10/10/2019  | 
The Center for Long Term Cybersecurity recently awarded grants to six artists in a contest to come up with ideas for works with security themes and elements. Check 'em out.
Can the Girl Scouts Save the Moon from Cyberattack?
Feature  |  10/8/2019  | 
The Girl Scouts Cyber Challenge event, later this month, pledges to give middle and high-school girls a realistic, and fun, look at cybersecurity careers.
6 Active Directory Security Tips for Your Poor, Neglected AD
Feature  |  10/7/2019  | 
The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.
Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage'
Feature  |  10/4/2019  | 
In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need?
Time to Put This 'Toon to Bed
Feature  |  10/4/2019  | 
The winning captions for September's cartoon contest are nothing to yawn about.
Cartoon Contest: Second Wind
Feature  |  10/3/2019  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
How the City of Angels Is Tackling Cyber Devilry
Feature  |  10/3/2019  | 
A new mobile app makes a cybersecurity threat lab available to more small businesses in Los Angeles.
How Private Are You?
Feature  |  10/2/2019  | 
Think twice before posting about ... grits.
The Inestimable Values of an Attacker's Mindset & Alex Trebek
Feature  |  10/2/2019  | 
Akamai security architect Marc Pardee tells the story of cutting his security teeth as an NSA intern and why all cybersecurity professionals can benefit from learning how to break things.
5 Disruptive Trends Transforming Cybersecurity
Feature  |  10/1/2019  | 
Everything about IT has changed, but our security measures are still built around how we used to design software and systems. Where does security need to catch up with digital transformation and how?
The Etiquette of Respecting Privacy in the Age of IoT
Feature  |  9/28/2019  | 
Is it rude to ask someone to shut off their Alexa? Ask the family who's written the book on etiquette for nearly 100 years the descendants of Emily Post herself.
Why Clouds Keep Leaking Data
Feature  |  9/26/2019  | 
Most devastating cloud data leaks are caused by the same kinds of common cloud security challenges and configuration errors. Here's what you need to know.
The Beginner's Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns
Feature  |  9/25/2019  | 
DoS attacks come in many varieties (not just DDoS). This simple set of descriptions will help you understand how they're different and why each and every one is bad.
Cloud Insight ... and Stuff
Feature  |  9/25/2019  | 
All fluff, all the time.
'Playing Around' with Code Keeps Security, DevOps Skills Sharp
Feature  |  9/23/2019  | 
A project intended to move a small robot around a hazardous board teaches some solid security lessons.
A Beginner's Guide to Microsegmentation
Feature  |  9/20/2019  | 
In a world in which the data center perimeter has all but evaporated, traditional segmentation no longer is enough. Enter microsegmentation. Here's what organizations need to do to maximize the benefits of this improved security architecture.
The 20 Worst Metrics in Cybersecurity
Feature  |  9/19/2019  | 
Security leaders are increasingly making their case through metrics, as well they should as long as they're not one of these.
The Top 'Human Hacks' to Watch For Now
Feature  |  9/18/2019  | 
Social engineering is as old as mankind. But its techniques have evolved with time. Here are the latest tricks criminals are using to dupe end users.
Poll Results: Maybe Not Burned Out, But Definitely 'Well Done'
Feature  |  9/17/2019  | 
Staff shortages and increasingly challenging jobs are turning up the heat on security pros, readers say.
Get Smart
Feature  |  9/17/2019  | 
On a scale of 1 to 5, how 'smart' is your home?
How a PIA Can CYA
Feature  |  9/16/2019  | 
More than a compliance mandate, privacy impact assessments can also spot risks early in the product development cycle.
Escaping Email: Unlocking Message Security for SMS, WhatsApp
Feature  |  9/12/2019  | 
Messaging is growing in importance as dislike for email increases. That means knowing how to protect critical data in the messaging era is a must for IT security.
Community Projects Highlight Need for Security Volunteers
Feature  |  9/11/2019  | 
From university courses to open source self-starters, community software projects aim to solve problems for populations in need. A focus on security is required as well.
Security Pros' Painless Guide to Machine Intelligence, AI, ML & DL
Feature  |  9/10/2019  | 
Artificial intelligence, machine learning, or deep learning? Knowing what the major terms really mean will help you sort through the morass of words on the subject and the security uses of each.
Just a Few Questions Before That Bank Withdrawal ...
Feature  |  9/9/2019  | 
And be ready to turn over your first born.
Phishers' Latest Tricks for Reeling in New Victims
Feature  |  9/9/2019  | 
Phishing works because people are, by nature, trusting -- but these evolving phishing techniques make it even tougher for security managers to stay on top.
8 Ways to Spot an Insider Threat
Feature  |  9/6/2019  | 
The good news is most insider threats derive from negligence, not malicious intent. The bad news is the frequency of negligence is already ahead of where it was in 2018.
Meet FPGA: The Tiny, Powerful, Hackable Bit of Silicon at the Heart of IoT
Feature  |  9/5/2019  | 
Field-programmable gate arrays are flexible, agile-friendly components that populate many infrastructure and IoT devices and have recently become the targets of researchers finding vulnerabilities.
Cartoon Contest: Bedtime Stories
Feature  |  9/4/2019  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
'It Takes Restraint': A Seasoned CISO's Sage Advice for New CISOs
Feature  |  9/3/2019  | 
Todd Fitzgerald wrote the books on being a chief information security officer. Here he offers tips on what to do and what not to do in the first few months of a new CISO job.
'It Saved Our Community': 16 Realistic Ransomware Defenses for Cities
Feature  |  8/30/2019  | 
Practical steps municipal governments can take to better prevent and respond to ransomware infections.
Fuzzing 101: Why Bug Hunters Still Love It After All These Years
Feature  |  8/28/2019  | 
Fuzzing is one of the basic tools in a researcher's arsenal. Here are the things you should know about this security research foundational tool.
Never Forget Your Passwords Again!
Feature  |  8/28/2019  | 
You never know what those late-night infomercials are going to turn up.
The Right to Be Patched: How Sentient Robots Will Change InfoSec Management
Feature  |  8/27/2019  | 
It won't be long before we consider embodied AI as a form of "life" and that will have a variety of paradigm-shifting, somewhat irritating, and potentially hilarious impacts on the daily lives of infosec and privacy pros.
'Culture Eats Policy for Breakfast': Rethinking Security Awareness Training
Feature  |  8/26/2019  | 
What's definitely not working with end-user cybersecurity awareness training and what you can do about it.
Clogged Cache? The Edge Cartoon Contest Winners
Feature  |  8/23/2019  | 
Creativity flowed, but two captions rose to the top.
Haas Formula 1 CIO Builds Security at 230 Miles per Hour
Feature  |  8/22/2019  | 
As the CIO for both Formula 1 and NASCAR racing teams, Gary Foote is tackling the same security issues as other manufacturing CIOs with a huge dash of motorized mayhem thrown in.
How to Avoid Technical Debt in Open Source Projects
Feature  |  8/21/2019  | 
Engineering teams have only a certain amount of capacity. Cutting down the volume of rework inherent in the open source business model begins with three best practices.
5 Ways to Improve the Patching Process
Feature  |  8/20/2019  | 
So many software vulnerabilities, so little time. But failure to patch them can have serious consequences. Here's help for overwhelmed security teams.
Modern Technology, Modern Mistakes
Feature  |  8/19/2019  | 
As employees grow more comfortable using new technologies, they could inadvertently be putting their enterprises at risk. And that leaves security teams having to defend an ever-expanding attack surface.
Compliance Training? What Compliance Training?
Feature  |  8/19/2019  | 
Employees can run ... but they can't hide. Or can they?
5 Things to Know About Cyber Insurance
Feature  |  8/15/2019  | 
More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy.
You Gotta Reach 'Em to Teach 'Em
Feature  |  8/14/2019  | 
As threats continue to evolve and cybercriminals become more sophisticated, organizations that lack a mature security awareness and training program place themselves at serious risk.
Moving on Up: Ready for Your Apps to Live in the Cloud?
Feature  |  8/13/2019  | 
Among the complications: traditional security tools work poorly or not at all in the cloud, and if a company screws up, the whole Internet will know.
Modern-Day SOCs: People, Process & Technology
Feature  |  8/12/2019  | 
As businesses look to the future and invest in next-generation tools, here are some considerations for more effective planning.
Slow Your Roll Before Disclosing a Security Incident
Feature  |  8/8/2019  | 
Transparency rules, but taking the right amount of time to figure out what happened will go a long way toward setting the record straight.
Securing DevOps Is About People and Culture
Feature  |  8/6/2019  | 
Preconceived notions and divisions make building security into the software development life cycle an uphill battle for many organizations.
Page 1 / 2   >   >>

Flash Poll