Q1. From your vantage point as the editor-in-chief of Dark Reading what were some of the most notable developments/changes in the cybersecurity industry over the past year?
Although many new threats have emerged in the past year — and some are definitely serious — I think the biggest shift is what's happening in the enterprise and in the datacenter. There is a wholesale shift toward the cloud happening, and it necessarily changes the way security professionals think and work. The old school thinking about creating a defensible "enterprise network" is rapidly being replaced by the need to develop a security strategy that extends across cloud service providers as well as software-as-a-service and cloud applications.
For the security team, these cloud environments represent an entirely new way of thinking. For one thing, there's no easy way to guarantee visibility into all the data you might need in order to diagnose security problems. You can only see what the service provider allows you to see, which in some cases is fairly limited. If there's an incident or a breach, it's not just your team that has to respond — you must rely on your cloud service provider to work with you on incident response. A good relationship with your cloud services providers is essential to the security of the entire enterprise. You're relying on them to provide visibility into the security data you need, and to be a good partner if an issue occurs.
Cloud security also requires a completely different mindset, and it can be difficult to master for those who have been doing traditional perimeter-based, on-premises security for many years. In the cloud, boundaries are drawn very differently — not only in the enterprise, but between applications and data. You can set up multiple accounts or instances for different applications, and vary the rules of each to help maximize security. You're not creating a single enterprise security policy — you're creating many policies for many applications and sets of data, and counting on your service provider to help you enforce them. It's a completely different way of thinking, and those who try their old, on-premises security policies and practices to new cloud environments are missing out on the value and potential of cloud services.
Of course, that's just one of the shifts we've been seeing in the data center and the security department. But it's a good example of how things are changing. Whether it's mobile networking, supply chain security, or the Internet of Things, security pros are increasingly finding that the things they are responsible for securing are increasingly outside their sphere of control. Today's security teams aren't trying to build walls and defend them. They're trying to build visibility and policies that extend across a wide range of networks and computing environments.
Q2. How have expectations for cybersecurity news reporting and analysis changed in the years since Dark Reading first launched? What do your readers want and expect from you these days?
When Dark Reading launched in 2006, the laws requiring companies to report security breaches were just starting to go into effect. In those early days, it could be difficult to find news because breaches weren't broadly reported. And security researchers weren't the rock stars they are today — many were working in obscurity.
I think the value that Dark Reading has provided to the industry — and this is mainly through the effort of Kelly Jackson Higgins, our executive editor and top reporter — is that we've helped bring security research to light. Vulnerability research has evolved to be both critical and cool, and we've had a chance to bear witness to that evolution. Our reporting also has helped enterprises to see that they aren't the only ones experiencing breaches — we report on at least one or two doozies every day. Breaches can happen to any organization, and the only way this industry can get better is to acknowledge failure and share what we've learned. Security pros are still reluctant to share those experiences, but it's a lot better today than when we first started.
In 13 years, Dark Reading has gone from startup website to the industry's most known cybersecurity news site. We've gone from two people to a whole team that not only writes news but also produces research, webinars, ezines, and both virtual and live events. But we're not stopping there. On July 8, we launched a new, features-oriented section called The Edge, which provides a different perspective on security reporting. The Edge is a platform for the Dark Reading team to publish in-depth features, trend stories, and expert-written content that aren't available in our main news section. You can think of The Edge as an analog to the Sunday magazine in your local daily newspaper — it's a vehicle to publish features, perspective, and entertaining copy that the daily staff doesn't have time to produce. We hope it will give security professionals some help in learning about best practices as well as emerging threats and technology trends.
Q3. What are Dark Reading's plans at Black Hat USA 2019? What do you wanted attendees to know about your publication and brand?
At this year's Black Hat USA, as in past years, Dark Reading's most visible contribution will be the live Dark Reading News Desk, which will be physically located at the entrance to the exhibit floor. The Dark Reading News Desk provides hours of live coverage of the show, streamed across the Web, so that both attendees and non-attendees can get some insight on the important vulnerabilities that are being disclosed at the show. Hosted by Dark Reading senior editor Sara Peters, the News Desk offers interviews with top speakers and technology providers and provides insight on the news being broken during Black Hat USA week. It's definitely something that security pros will want to check out, especially if they can't be at Black Hat USA.
In addition, Dark Reading does more coverage of Black Hat than any other publication on the Web. Last year, we wrote more than 40 stories around the show, recognizing that virtually every Briefings and Arsenal presentation is breaking news — we're learning about new vulnerabilities, threats, and tools that we didn't know about before. From a news perspective, Black Hat USA is the biggest event of the security industry's year, so we do everything we can to cover it. We even publish a special, daily newsletter for show attendees and Dark Reading subscribers so that you can get a recap of what's happening every day of the show.
Finally, through partnerships with the Black Hat team, Dark Reading is fortunate to be able to participate in the conference program itself. Dark Reading editors will moderate four different sessions during the show, including two in the Sponsored Workshops environment and two in Innovation City. We'll participate in the annual Black Hat CISO Summit. And we'll show some of the first fruits of our growing partnership with research and consulting firm Ovum, which began when Informa LLC acquired Dark Reading's parent company last year.