Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Webcast: Doing More IT With Less

by Dark ReadingJul 23, 2020

If there is one universal truth among IT organizations, it's a shortage of budget.

IT professionals probably entered 2020 wondering whether you could do the job with the resources they had. Add in COVID-19 and a crashing economy, and we now have our answer.

This information-packed event looks at some of the key strategies your IT organization can use to stretch your technology, rethink costly processes, and create new ways of doing business on a shoestring. Top IT practitioners, leaders, and experts will share proven methods for rethinking operational spending, while still supporting the organization’s need to innovate in new ways.


Research Report: Special Report: The Changing Face of Threat Intelligence

by Dark ReadingJul 21, 2020

Ten years ago, enterprises' best "threat intel" was limited to what they could read on a few websites or what was unveiled on Microsoft's Patch Tuesday. Today, however, enterprises are overwhelmed with options for receiving new information about cyber threats, ranging from commercial feeds to industry ISACs to specialized tools and services that collect, analyze, and prioritize threat data. How should enterprises aggregate, collate, and interpret threat data? How can they integrate threat data with operational systems to develop automated responses and remediation processes? In this special report, Dark Reading takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response.

Inside this report:

  • How InfoSec Pros Can Help Intelligence
  • Security & Trust Ratings Proliferate: Is That a Good Thing?
  • Making the Case for Process Documentation in Cyber Threat Intel
  • Prove Your Readiness to Defend Against Attacks by Operationalizing Threat Intelligence

The information submitted is collected by both Informa Tech and our sponsor Mandiant. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Special Report: Computing's New Normal, a Dark Reading Perspective

by Dark ReadingJul 01, 2020

The COVID-19 pandemic created new models of computing almost literally overnight.

This special report examines how IT security organizations have adapted to this "new normal" of computing and what the long-term effects will be. Read the report and get a unique set of perspectives on issues ranging from new threats and vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The Threat from the Internet—and What Your Organization Can Do About It

by Dark ReadingJun 19, 2020

For most enterprises, the increasing use of the Internet has created new business opportunities, greater efficiencies, and a greenfield for innovation. However, online attackers have launched a wide range of Internet-borne attacks, ranging from DDoS to cloud data leaks to infiltration of e-commerce sites. And with the world relying more heavily on Web-based communication during the COVID-19 pandemic, new threats are emerging. This report by Dark Reading and sponsored by CyCognito, describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business.

This report will cover:
• How cyberattackers are adapting their own techniques to more effectively compromise businesses using work-from-home models
• How to defend against attackers that abuse cloud services, Web APIs and agile development
• What security questions you should ask to companies that provide your e-commerce, content management, collaboration, hosting, cloud storage and other online services
• Why it is essential for businesses to identify the blind spots in their computing environment

The information submitted is collected by both Informa Tech and our sponsor CyCognito. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Webcast: Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingJun 17, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.

For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.

Preparing For, Detecting, and Managing a Critical Data Breach -- a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll hear about tools and best practices for detecting a breach, even when it’s well-obfuscated. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.

Among the topics that will be covered at Preparing For, Detecting, and Managing a Critical Data Breach:

  • Strategies for creating and rehearsing an enterprise-wide breach response plan
  • Best practices and technologies for detecting potential intrusions or infections
  • Recommendations for building and managing an incident response plan
  • Methods for limiting the scope and impact of a data breach
  • How to determine the extent of a breach, and what system/partners may be affected
  • Strategies for speeding the remediation process
  • Limiting the costs and liabilities associated with cyber breaches
  • Lessons learned: how to monitor and collect data on future threats

If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow -- then this virtual event is for you. Register today!


Webcast: Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingJun 17, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.

For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.

Preparing For, Detecting, and Managing a Critical Data Breach -- a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll hear about tools and best practices for detecting a breach, even when it’s well-obfuscated. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.

Among the topics that will be covered at Preparing For, Detecting, and Managing a Critical Data Breach:

  • Strategies for creating and rehearsing an enterprise-wide breach response plan
  • Best practices and technologies for detecting potential intrusions or infections
  • Recommendations for building and managing an incident response plan
  • Methods for limiting the scope and impact of a data breach
  • How to determine the extent of a breach, and what system/partners may be affected
  • Strategies for speeding the remediation process
  • Limiting the costs and liabilities associated with cyber breaches
  • Lessons learned: how to monitor and collect data on future threats

If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow -- then this virtual event is for you.


Digital Editorial Content: How Cybersecurity Incident Response Programs Work (and Why Some Don’t)

by Dark ReadingMay 11, 2020

This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.

Here's a preview of what's inside:

  • How Cybersecurity Incident Response Programs Work (and Why Some Don't)
  • Cyber Resilience Benchmarks 2020
  • How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policy.
DomainToolsWhiteHat SecurityExtraHopTenableCofenseSplunkCorelighteSentireSpirionRadwarePanoraysWaterfall Security SolutionsBlueVoyantMenlo SecurityRangeforceNeustar, Inc.VMwareQualysIronNet CybersecurityArmis, Inc.ManageEngineRecorded FuturePalo Alto Networks

This digital issue is sponsored by:
Tech Digest Sponsor Logos


Research Report: State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

by Dark ReadingApr 27, 2020

It is often said that the end user is cybersecurity's weakest link. Enterprises are doing a great deal to strengthen that link, having deployed a wide array of tools and processes for protecting against endpoint threats. However, many organizations remain dangerously vulnerable to security lapses caused by end users.

In this report, Dark Reading reveals how enterprise security professionals are building their endpoint security defenses and increasing security awareness training. The findings uncover the concern among enterprise organizations over the threat to security posed by end users who are careless, negligent, or malicious, and those who refuse to follow security policies. Download this report to find out what organizations are doing to secure their endpoints and to protect themselves against malware, hackers, and social engineering attacks.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: State of Cybersecurity Incident Response

by Dark ReadingFeb 27, 2020

Every day, enterprises wrestle with cybersecurity compromises of all sizes and types, ranging from simple viruses to complex, targeted online attacks. To successfully defend their data, IT organizations are developing teams, tools, and processes to quickly respond to new cyber threats and compromises--but not all of them are succeeding. Many security leaders appear to be overestimating their ability to detect and respond to security incidents. Many organizations lack dedicated staff for handling incident response functions. And the heightened awareness around cyber incident response, some organizations' definition of a "security incident" may overlook significant events.

In this Dark Reading Report, "How Enterprises Respond to the Incident Response Challenge," we find out:

• How enterprises are building their incident response teams and processes
• How enterprises research potential compromises and respond to new breaches
• What tools and processes enterprises use to remediate problems and improve their cyber defenses for the future.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: 6 Emerging Cyber Threats That Enterprises Face in 2020

by Dark ReadingFeb 11, 2020

Enterprise organizations will face a combination of traditional and nontraditional cyber threats in 2020. Many of the threats that plagued organizations in the past will remain potent. But attackers leveraging artificial intelligence (AI) and machine learning (ML) tools will give IT security professionals plenty of new challenges to deal with in 2020 and the years ahead.

This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020.

Here's what's inside:

  • 6 Emerging Cyber Threats That Enterprises Face in 2020
  • How China & Russia Use Social Media to Sway the West
  • Utilities' Operational Networks Continue to Be Vulnerable
  • 5G Standard to Get New Security Specifications
  • ASUS 'ShadowHammer' Attack Underscores Trusted Third-Party Risks
The information submitted is collected by both Informa Tech and our sponsors. Informa Tech's privacy policy.
Menlo SecurityDomainToolsCyberGRXWhiteHat SecuritySecurityScorecardeSentireReliaQuestExtraHopPalo Alto NetworksTenableThycotic SoftwareBlueVoyantVMwareRibbon CommunicationsZeroNorthCofenseSplunkPrevailionCisco

This digital issue is sponsored by:
Tech Digest Sponsor Logos