Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Digital Editorial Content: The Biggest Cybersecurity Breaches of 2018 (So Far)

by Dark ReadingJul 19, 2018

This is Dark Reading's July Tech Digest explores the biggest cybersecurity breaches of the first half of 2018.

IN THIS REPORT:

  • The Biggest Cybersecurity Breaches of 2018 (So Far)
  • LA County Nonprofit Exposes 3.2M PII Files via Unsecured S3 Bucket
  • SunTrust Ex-Employee May Have Stolen Data on 1.5 Million Bank Clients
  • Sears & Delta Airlines Are Latest Victims of Third-Party Security Breach
  • Panera Bread Leaves Millions of Customer Records Exposed Online
  • Hudson's Bay Brands Hacked, 5 Million Credit Card Accounts Stolen
  • Under Armour App Breach Exposes 150 Million Records
  • Baltimore Hit with Hack on 911 System
  • Hack Costs Coincheck Cryptocurrency Exchange $530 Million


Research Report: State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

by Dark ReadingApr 27, 2020

It is often said that the end user is cybersecurity's weakest link. Enterprises are doing a great deal to strengthen that link, having deployed a wide array of tools and processes for protecting against endpoint threats. However, many organizations remain dangerously vulnerable to security lapses caused by end users.

In this report, Dark Reading reveals how enterprise security professionals are building their endpoint security defenses and increasing security awareness training. The findings uncover the concern among enterprise organizations over the threat to security posed by end users who are careless, negligent, or malicious, and those who refuse to follow security policies. Download this report to find out what organizations are doing to secure their endpoints and to protect themselves against malware, hackers, and social engineering attacks.


Research Report: State of Cybersecurity Incident Response

by Dark ReadingFeb 27, 2020

Every day, enterprises wrestle with cybersecurity compromises of all sizes and types, ranging from simple viruses to complex, targeted online attacks. To successfully defend their data, IT organizations are developing teams, tools, and processes to quickly respond to new cyber threats and compromises--but not all of them are succeeding. Many security leaders appear to be overestimating their ability to detect and respond to security incidents. Many organizations lack dedicated staff for handling incident response functions. And the heightened awareness around cyber incident response, some organizations' definition of a "security incident" may overlook significant events.

In this Dark Reading Report, "How Enterprises Respond to the Incident Response Challenge," we find out:

• How enterprises are building their incident response teams and processes
• How enterprises research potential compromises and respond to new breaches
• What tools and processes enterprises use to remediate problems and improve their cyber defenses for the future.


Research Report: Special Report: Understanding Your Cyber Attackers

by Dark ReadingAug 19, 2020

To prepare an effective defense of your enterprise data, you need to know something about the types of attackers you're facing — and the methods they use. In this Dark Reading special report, you'll learn about the strategies you can employ to evaluate your enterprise's "attack surface" and the potential threats that affect organizations like yours.

In this comprehensive report, you'll get insight on how to evaluate your defenses through penetration and red-teaming, as well as advice and tips on how to use threat intelligence tools to help gauge the risk faced by your specific organization. You'll also get recommendations on how to implement threat hunting practices that can help you identify potential attackers and exploits before they hit your enterprise.

If you want to get a better sense of the threats that might be coming — and your organization's vulnerability to those threats — this special report is a must-read.

Inside this report:

  • Why and How to Understand Your Cyber Attackers
  • How Advanced Attackers Take Aim at Office 365
  • Criminals Turn to IM Platforms to Avoid Law Enforcement Scrutiny
  • Mobile Phishing Attacks Increase Sharply
  • Targeted Discovery: Why Attack Surface Management Isn't Enough

The information submitted is collected by both Informa Tech and our sponsor Randori. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Special Report: The Changing Face of Threat Intelligence

by Dark ReadingJul 21, 2020

Ten years ago, enterprises' best "threat intel" was limited to what they could read on a few websites or what was unveiled on Microsoft's Patch Tuesday. Today, however, enterprises are overwhelmed with options for receiving new information about cyber threats, ranging from commercial feeds to industry ISACs to specialized tools and services that collect, analyze, and prioritize threat data. How should enterprises aggregate, collate, and interpret threat data? How can they integrate threat data with operational systems to develop automated responses and remediation processes? In this special report, Dark Reading takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response.

Inside this report:

  • How InfoSec Pros Can Help Intelligence
  • Security & Trust Ratings Proliferate: Is That a Good Thing?
  • Making the Case for Process Documentation in Cyber Threat Intel
  • Prove Your Readiness to Defend Against Attacks by Operationalizing Threat Intelligence

The information submitted is collected by both Informa Tech and our sponsor Mandiant. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Special Report: Computing's New Normal, a Dark Reading Perspective

by Dark ReadingJul 01, 2020

The COVID-19 pandemic created new models of computing almost literally overnight.

This special report examines how IT security organizations have adapted to this "new normal" of computing and what the long-term effects will be. Read the report and get a unique set of perspectives on issues ranging from new threats and vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.


Research Report: Rethinking Enterprise Data Defense

by Dark ReadingNov 01, 2019

What are the chief concerns of today's enterprise data defenders? What technologies and best practices do they find to be most effective in preventing compromises, and what methods have they found to make better use of their staffing and funding resources? In this survey we ask security professionals for insight on what they're doing that works - and what doesn't. Readers will get advice and recommendations from their peers on how to invest their IT security resources, and how to mitigate the latest attacks and exploits.


Research Report: Research Report: How Data Breaches Affect the Enterprise

by Dark ReadingAug 30, 2018

Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future.


Webcast: Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingJun 17, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.

For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.

Preparing For, Detecting, and Managing a Critical Data Breach -- a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll hear about tools and best practices for detecting a breach, even when it’s well-obfuscated. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.

Among the topics that will be covered at Preparing For, Detecting, and Managing a Critical Data Breach:

  • Strategies for creating and rehearsing an enterprise-wide breach response plan
  • Best practices and technologies for detecting potential intrusions or infections
  • Recommendations for building and managing an incident response plan
  • Methods for limiting the scope and impact of a data breach
  • How to determine the extent of a breach, and what system/partners may be affected
  • Strategies for speeding the remediation process
  • Limiting the costs and liabilities associated with cyber breaches
  • Lessons learned: how to monitor and collect data on future threats

If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow -- then this virtual event is for you.


Webcast: Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingJun 17, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.

For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.

Preparing For, Detecting, and Managing a Critical Data Breach -- a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll hear about tools and best practices for detecting a breach, even when it’s well-obfuscated. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.

Among the topics that will be covered at Preparing For, Detecting, and Managing a Critical Data Breach:

  • Strategies for creating and rehearsing an enterprise-wide breach response plan
  • Best practices and technologies for detecting potential intrusions or infections
  • Recommendations for building and managing an incident response plan
  • Methods for limiting the scope and impact of a data breach
  • How to determine the extent of a breach, and what system/partners may be affected
  • Strategies for speeding the remediation process
  • Limiting the costs and liabilities associated with cyber breaches
  • Lessons learned: how to monitor and collect data on future threats

If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow -- then this virtual event is for you. Register today!