Investigative reporter Hakan Tanriverdi discusses his investigation into a possible nation-state attack, the role of Farsight DNSDB, and the investigation’s biggest surprises.
Read interviewIn this insightful interview, Troels discusses the common security challenges that global CISOs are facing due to the pandemic, the World Economic Forum Global Centre for Cybersecurity's goal to reduce the global attack surface, and why he decided to pursue a career in cybersecurity.
Read interviewTom discusses the main reason why he founded ThreatSTOP, the top three cybersecurity threats facing organizations today, how organizations can reduce the risk of cyberthreats associated with new domains, and much more.
Read interviewIn this insightful interview, Allan Thomson, Chief Technology Officer, LookingGlass Cyber Solutions discusses the new joint whitepaper with Farsight on reducing third-party risk using Passive DNS, why the security industry needs to start thinking differently, and the limits of machine learning in creating effective threat intelligence.
Read interviewGabe discusses his top three surprise findings in the 2019 Verizon Data Breach Investigations Report (DBIR) report, the most common "starting points" for a data breach, the prevalence of organized crime, and more.
Read interviewIn this insightful interview, EclecticIQ Founder and CEO Joep Gommers discusses the evolution of the threat landscape and what organizations can do to close the gap between compromise and detection.
Read interviewPaul explains why forgery and impersonation remains a common attack method, the risks of outsourcing, and what he has learned from his Farsight staff that has made him a better CEO.
Read interviewMarc discusses whether the integrity of November midterm elections is at risk, the types of misinformation the new office will work to counter, and whether California will move to online voting.
Read interviewKelly discusses her work at Dark Reading, including what security vendors can do to improve their work with her team and her favorite stories to write, as well as shares how many times she has seen Bruce Springsteen (hint: it's a lot!).
Read interviewScott reflects on his path to a career in cybersecurity, why cyberattacks make international headlines, and what Fortune 500 boardrooms get right -- and wrong -- about managing risk.
Read interviewAdam reveals his first mentor in the security industry, the top security problems ThreatConnect is trying to solve, and what is needed to enable the real power of information sharing.
Read interviewAlexa reflects how she first became interested in DNS, outlines the top factors driving passive DNS adoption, discusses whether more Internet governance is needed to curb DNS abuse and more in this riveting interview.
Read interviewJonathan reveals the greatest cyberthreat to organizations today, discusses when attribution "really" matters in threat hunting, why industry collaboration is key in the fight against cybercrime, and more.
Read interviewLevi discusses how the terrorist attacks on September 11th, 2001 led to his career in cybersecurity, the future of phishing, and essential tools for an in-house threat intelligence program.
Read interviewBen reflects on the need for diversity in cybersecurity teams, his approach to security research, and top three security challenges enterprises face today.
Read interviewDaniel discusses the top 3 challenges for today's CISO, how CISOs can attract and retain experienced cybersecurity staff, and how Passive DNS can help organizations better respond to and protect against cyberattacks.
Read interviewMerike reflects on the significance of the cyberattack against Estonia, how organizations can protect against DDoS attacks, and the role of the international Internet community in reducing risk.
Read interviewPaul defines and discusses Insider Threats and what most organizations get wrong in protecting against them.
Read interview