Greatest Hits Of 2016: Readers' Picks For The Years' Best Commentary
Here’s what topped the Dark Reading page-view charts from the security industry’s brightest minds, coolest rock stars, and up-and-coming leaders.
The hacking thriller Mr. Robot may have been snubbed by the 2017 Golden Globe Award nominating committee this month, but security researcher Sarah Vonnegut’s blog - 5 'Mr. Robot' Hacks That Could Happen in Real Life - about the award-winning season one, pulled in the highest numbers of readers of all the contributed content we published in 2016.
Vonnegut, an application security community specialist at Checkmarx, offered a reality check to anti-hero Elliot’s premier season hacking prowess, and garnered a whopping 14,738 page views from Dark Reading fans of the show.
Other 2016 favorites from our roster of contributors include:
Rethinking Application Security With Microservices Architectures (6,804 views, 4/15/2016)
Ranga Rajagopalan, Chief Technology Officer, Avi Networks
The advantages offered by the container model go against many of the assumptions of traditional security mechanisms. Here are 5 new concepts & 4 best practices you'll need to understand.
Security Portfolios: A Different Approach To Leadership (6,802 views, 8/11/2016)
Adam Shostack, Founder, Stealth Startup
How grounding a conversation around a well-organized list of controls and their goals can help everyone be, literally, on the same page. Part seven of an ongoing series.
How To Stay Safe On The Black Hat Network (6,722 views, 7/28/2016)
Neil R. Wyler (Grifter), Threat Hunting and Incident Response Specialist, RSA
Black Hat attendees may have changed their titles and now carry business cards but hackers gotta hack and there's no better place to do it than Black Hat.
The Secret Behind the NSA Breach: Network Infrastructure Is The Next Target (6,683 views, 8/25/2016)
Yoni Allon Research Team Leader, LightCyber
How the networking industry has fallen way behind in incorporating security measures to prevent exploits to ubiquitous routers, proxies, firewalls, and switches.
Anatomy Of An Account Takeover Attack (6,389 views, 2/23/2016)
Ting-Fang Yen, Research Scientist, Datavisor, Inc.
How organized crime rings are amassing bot armies for password-cracking attacks on personal accounts in retail, financial, gaming, and other consumer-facing services.
20 Endpoint Security Questions You Never Thought to Ask (5,696 views, 10/26/2016)
Joshua Goldfarb. VP & CTO - Emerging Technologies, FireEye
The endpoint detection and response market is exploding! Here's how to make sense of the options, dig deeper, and separate vendor fact from fiction.
5 Soft Skills Young Cybersecurity Professionals Need to Get Ahead (5,615 views 6/14/2016)
Todd Thibodeaux, President & CEO, CompTIA
Today's employers aren't looking for recruits who can maintain firewalls and mitigate risk. They want well-rounded professionals who can apply security expertise across the business to yield bottom-line results.
Why Social Media Sites Are The New Cyber Weapons Of Choice (5,387 views, 9/6/2016)
Nick Hayes, Analyst, Forrester
Facebook, LinkedIn, and Twitter can't secure their own environments, let alone yours. It's time to sharpen your security acumen.
Changing IoT Passwords Won't Stop Attacks. Here's What Will (5,173 views, 11/7/2016)
Paul Madsen, Senior Technical Architect, Ping Identity
The solution will take an industry-wide effort, it won't happen overnight, and the problem is not the users' fault!
Do you have a favorite contributor commentary of 2016? Share it in the comments!
Related Content:
About the Author
You May Also Like
The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024