Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Latest Content tagged with Edge Articles
Page 1 / 2   >   >>
5 Tips for Fighting Credential Stuffing Attacks
Feature  |  5/22/2020  | 
With stolen credentials an easy find online, what are some measures to put in place to keep hackers from breaking into secure accounts?
Dark Reading Edge Cybersecurity Crossword Puzzle, May 22th
Ask The Experts  |  5/22/2020  | 
Have a hard time coming up with the answers to these puzzle questions? We know a great place to look for more clues...
The Entertainment Biz Is Changing, but the Cybersecurity Script Is One We've Read Before
Feature  |  5/15/2020  | 
Several A-list celebrities have found themselves at the center of a ransomware attack -- and it's certainly not the first time hackers have gone after them or the entertainment industry. What are security pros doing wrong?
Biometrics in the Great Beyond
Feature  |  5/13/2020  | 
A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee's death?
Cybersecurity Home School: Garfield Teaches Security
Feature  |  5/7/2020  | 
The famous cartoon cat can help kids ages 6 to 11 learn to be more secure when they're online.
Post-Pandemic Presentation Plans
Feature  |  5/5/2020  | 
Coming to a conference near you -- who knows when.
How InfoSec Pros Can Help Healthcare During the Coronavirus Pandemic
Feature  |  5/4/2020  | 
Security pros are banding together to ensure healthcare facilities can focus on saving lives instead of defending against cyber attacks. Here are a few places you can volunteer your services.
Name That Toon: The Lights Are On ...
Feature  |  5/1/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
User-Friendly Cybersecurity: Is a Better UX the Key to a Better Defense?
Feature  |  4/30/2020  | 
Frictionless security, improved interfaces, and more usable design may improve the efficacy of security tools and features (and make life easier for users and infosec pros alike). So why has there been so much resistance?
Election Security in the Age of Social Distancing
Feature  |  4/29/2020  | 
Although the controversial option of voting by mobile app is one pressing consideration, cybersecurity experts agree that older issues need to be resolved before November 3.
Will the Pandemic Complicate Cyber Insurance Claims?
Ask The Experts  |  4/27/2020  | 
While quarantined workers are keeping safe at home, they could be jeopardizing your insurance policy.
5 Ways to Prove Security's Worth in the Age of COVID-19
Feature  |  4/23/2020  | 
Tightened budgets are placing jobs at risk, but security pros say they're armed with ways to demonstrate that what they're doing merits keeping them employed.
Learning from the Honeypot: A Researcher and a Duplicitous Docker Image
Feature  |  4/22/2020  | 
When Larry Cashdollar set up a honeypot in a Docker image, he found behavior that was more enlightening than he had imagined.
Poll: Worried About Losing Your Job?
Feature  |  4/22/2020  | 
With the unemployment rate surging due to COVID-19, are you concerned your job is in jeopardy?
Cybersecurity Home-School: The Robot Project
Feature  |  4/17/2020  | 
This fun project can teach your homebound children and teens about cybersecurity (and keep them occupied for at least a little while).
Which InfoSec Jobs Will Best Survive a Recession?
Feature  |  4/15/2020  | 
With COVID-19 making a mess of the global economy, companies are seeking to cut corners - and some boardrooms still see security as a "cost center." Are infosec careers vulnerable now?
When All Behavior Is Abnormal, How Do We Detect Anomalies?
Feature  |  4/10/2020  | 
Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects of life, is it possible to build baselines and measure normal patterns when nothing at all seems normal?
Feline Secure?
Feature  |  4/8/2020  | 
When there's a will, there's a way.
The Edge Names 'Holy Cow' Cartoon Caption Winners
Feature  |  4/7/2020  | 
What can cows possibly have to do with cybersecurity?
How Do I Make Sure My Work-From-Home Users Install Updates?
Ask The Experts  |  4/7/2020  | 
Most enterprise endpoint solutions will support policies to enforce recommended updates.
5 Soothing Security Products We Wish Existed
Feature  |  4/3/2020  | 
Maybe security alert fatigue wouldn't be so bad if the alerts themselves delivered less stress and more aromatherapy.
This Is Not Your Father's Ransomware
Feature  |  4/3/2020  | 
Ransomware operators are aiming for bigger targets and hitting below the belt. With doxing and extortion threats added to the mix, ransomware is evolving into something even more sinister.
Name That Toon: The Devil You Know?
Feature  |  4/2/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Untangling Third-Party Risk (and Fourth, and Fifth...)
Feature  |  3/30/2020  | 
Third parties bring critical products and services to your organization. They also bring risk that must be understood and managed.
How to Evict Attackers Living Off Your Land
Feature  |  3/26/2020  | 
As cyber defenses improve, adversaries are shifting to stealthy "living-off-the-land" attacks that use targets' own tools against them. Here are some tips to defend your turf.
Three Ways Your BEC Defense Is Failing & How to Do Better
Feature  |  3/23/2020  | 
Business email compromises cost the economy billions of dollars. Experts have advice on how to stop them from hitting you for millions at a pop.
Dark Reading Cybersecurity Crossword Puzzle
Feature  |  3/20/2020  | 
Here's a little something to snuggle up with if you're on lockdown.
Quantifying Cyber Risk: Why You Must & Where to Start
Feature  |  3/19/2020  | 
Quantifying cybersecurity risks can be a critical step in understanding those risks and getting executive support to address them.
Security Lessons We've Learned (So Far) from COVID-19
Feature  |  3/17/2020  | 
Takeaways about fighting new fires, securely enabling remote workforces, and human nature during difficult times.
Beyond Burnout: What Is Cybersecurity Doing to Us?
Feature  |  3/13/2020  | 
Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.
A Lesson in Social Engineering
Feature  |  3/13/2020  | 
What kind of school project is this?
CASB 101: Why a Cloud Access Security Broker Matters
Feature  |  3/12/2020  | 
A CASB isn't a WAF, isn't an NGF, and isn't an SWG. So what is it, precisely, and why do you need one to go along with all the other letters? Read on for the answer.
Keys to Hiring Cybersecurity Pros When Certification Can't Help
Feature  |  3/10/2020  | 
There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.
Out at Sea, With No Way to Navigate: Admiral James Stavridis Talks Cybersecurity
Feature  |  3/6/2020  | 
The former Supreme Allied Commander of NATO gives Dark Reading his take on the greatest cyberthreats our nation and its businesses face today.
Poll: Strengthening Security ... by Easing Security?
Feature  |  3/5/2020  | 
If security measures were made easier for end users, would your organization be more secure?
The Perfect Travel Security Policy for a Globe-Trotting Laptop
Feature  |  3/4/2020  | 
There are many challenges to safely carrying data and equipment on international travels, but the right policy can make navigating the challenges easier and more successful.
With New SOL4Ce Lab, Purdue U. and DoE Set Sights on National Security
Feature  |  3/3/2020  | 
The cooperative research initiative brings together faculty and students to "focus on problems and cutting-edge ways to solve them."
Name That Toon: Holy Cow!
Feature  |  3/2/2020  | 
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Tense Talk About Supply Chain Risk Yields Few Answers
Feature  |  2/27/2020  | 
RSA panelists locked horns over whether the ban preventing US government agencies from doing business with Huawei is unfairly singling out the Chinese telecom giant.
How to Prevent an AWS Cloud Bucket Data Leak
Feature  |  2/26/2020  | 
Misconfigured AWS buckets have led to huge data breaches. Following a handful of practices will help keep you from becoming the next news story.
Wendy Nather on How to Make Security 'Democratization' a Reality
Feature  |  2/25/2020  | 
Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users -- and start sharing control with them.
SSRF 101: How Server-Side Request Forgery Sneaks Past Your Web Apps
Feature  |  2/24/2020  | 
Server-side request forgery is a dangerous attack method that is also becoming an issue for the cloud. Here are some of the basics to help keep your Web server from turning against you.
10 Tough Questions CEOs Are Asking CISOs
Feature  |  2/20/2020  | 
CEOs today are prepared with better questions than 'Are we secure,' and chief information security officers had better be ready to answer.
The Road(s) to Riches
Feature  |  2/18/2020  | 
You could be making millions in just two years!
8 Things Users Do That Make Security Pros Miserable
Feature  |  2/18/2020  | 
When a user interacts with an enterprise system, the result can be productivity or disaster. Here are eight opportunities for the disaster side to win out over the productive.
Martin and Dorothie Hellman on Love, Crypto & Saving the World
Feature  |  2/15/2020  | 
Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth.
Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec
Feature  |  2/13/2020  | 
What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones?
Chaos & Order: The Keys to Quantum-Proof Encryption
Feature  |  2/12/2020  | 
The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up.
From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide
Feature  |  2/7/2020  | 
Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.
Phishing Personified
Feature  |  2/6/2020  | 
What makes these scams so completely obvious in the physical form?
Page 1 / 2   >   >>

Post-Pandemic Presentation Plans

Source: J4vv4D

We'd love to hear your ideas, too! Add them the Comments section, below.

What security-related videos have made you laugh? Let us know! Send them to [email protected].

Name That Toon: The Lights Are On ...
Flash Poll