Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website:

Latest Content From Dark Reading

Webcast: Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingJun 17, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.

For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.

Preparing For, Detecting, and Managing a Critical Data Breach -- a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll hear about tools and best practices for detecting a breach, even when it’s well-obfuscated. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.

Among the topics that will be covered at Preparing For, Detecting, and Managing a Critical Data Breach:

  • Strategies for creating and rehearsing an enterprise-wide breach response plan
  • Best practices and technologies for detecting potential intrusions or infections
  • Recommendations for building and managing an incident response plan
  • Methods for limiting the scope and impact of a data breach
  • How to determine the extent of a breach, and what system/partners may be affected
  • Strategies for speeding the remediation process
  • Limiting the costs and liabilities associated with cyber breaches
  • Lessons learned: how to monitor and collect data on future threats

If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow -- then this virtual event is for you. Register today!

Digital Editorial Content: How Cybersecurity Incident Response Programs Work (and Why Some Don’t)

by Dark ReadingMay 11, 2020

This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.

Here's a preview of what's inside:

  • How Cybersecurity Incident Response Programs Work (and Why Some Don't)
  • Cyber Resilience Benchmarks 2020
  • How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policy.
DomainToolsWhiteHat SecurityExtraHopTenableCofenseSplunkCorelighteSentireSpirionRadwarePanoraysWaterfall Security SolutionsBlueVoyantMenlo SecurityRangeforceNeustar, Inc.VMwareQualysIronNet CybersecurityArmis, Inc.ManageEngineRecorded FuturePalo Alto Networks

This digital issue is sponsored by:
Tech Digest Sponsor Logos

Research Report: State of Endpoint Security: How Enterprises Are Managing Endpoint Security Threats

by Dark ReadingApr 27, 2020

It is often said that the end user is cybersecurity's weakest link. Enterprises are doing a great deal to strengthen that link, having deployed a wide array of tools and processes for protecting against endpoint threats. However, many organizations remain dangerously vulnerable to security lapses caused by end users.

In this report, Dark Reading reveals how enterprise security professionals are building their endpoint security defenses and increasing security awareness training. The findings uncover the concern among enterprise organizations over the threat to security posed by end users who are careless, negligent, or malicious, and those who refuse to follow security policies. Download this report to find out what organizations are doing to secure their endpoints and to protect themselves against malware, hackers, and social engineering attacks.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:

Research Report: State of Cybersecurity Incident Response

by Dark ReadingFeb 27, 2020

Every day, enterprises wrestle with cybersecurity compromises of all sizes and types, ranging from simple viruses to complex, targeted online attacks. To successfully defend their data, IT organizations are developing teams, tools, and processes to quickly respond to new cyber threats and compromises--but not all of them are succeeding. Many security leaders appear to be overestimating their ability to detect and respond to security incidents. Many organizations lack dedicated staff for handling incident response functions. And the heightened awareness around cyber incident response, some organizations' definition of a "security incident" may overlook significant events.

In this Dark Reading Report, "How Enterprises Respond to the Incident Response Challenge," we find out:

• How enterprises are building their incident response teams and processes
• How enterprises research potential compromises and respond to new breaches
• What tools and processes enterprises use to remediate problems and improve their cyber defenses for the future.

Digital Editorial Content: 6 Emerging Cyber Threats That Enterprises Face in 2020

by Dark ReadingFeb 11, 2020

Enterprise organizations will face a combination of traditional and nontraditional cyber threats in 2020. Many of the threats that plagued organizations in the past will remain potent. But attackers leveraging artificial intelligence (AI) and machine learning (ML) tools will give IT security professionals plenty of new challenges to deal with in 2020 and the years ahead.

This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020.

Here's what's inside:

  • 6 Emerging Cyber Threats That Enterprises Face in 2020
  • How China & Russia Use Social Media to Sway the West
  • Utilities' Operational Networks Continue to Be Vulnerable
  • 5G Standard to Get New Security Specifications
  • ASUS 'ShadowHammer' Attack Underscores Trusted Third-Party Risks
The information submitted is collected by both Informa Tech and our sponsors. Informa Tech's privacy policy.
Menlo SecurityDomainToolsCyberGRXWhiteHat SecuritySecurityScorecardeSentireReliaQuestExtraHopPalo Alto NetworksTenableThycotic SoftwareBlueVoyantVMwareRibbon CommunicationsZeroNorthCofenseSplunkPrevailionCisco

This digital issue is sponsored by:
Tech Digest Sponsor Logos

Research Report: How Enterprises Are Developing and Maintaining Secure Applications

by Dark ReadingJan 30, 2020

One of the most common ways cybercriminals breach enterprises is by finding security vulnerabilities in the applications they use. Yet, with the skyrocketing speed of application development, many enterprises still struggle to build security into their software and eliminate dangerous flaws that might lead to data breaches. And most have experienced such severe security troubles with one application that they've simply migrated to a different one altogether.

In this 2020 Dark Reading report, How Enterprises Are Developing and Maintaining Secure Applications, we examine the most common issues associated with managing an application portfolio and how organizations are dealing with security risks. The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, but others seem to have no approach at all. As ever, attackers are keeping better pace with new business and development trends than defenders are. Organizations continue to struggle with application security risks — but our data show that partnerships between security and development teams seem to be improving. Download this informative report to learn more.

  • Details
  • Research Report

Research Report: How Enterprises are Attacking the Cybersecurity Problem

by Dark ReadingDec 24, 2019

Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. We share what IT and security practitioners had to say about their biggest security challenges and the technologies they are using to address them. Download this report to learn more.

Research Report: How Data Breaches affect the Enterprise

by Dark ReadingDec 10, 2019

Despite increased enterprise investments in cybersecurity, 2019 is on track to be the worst year ever for data breaches. A growing number of organizations are experiencing significant financial losses, brand damage, and customer alienation issues as a result of the increased breach activity.

How do these breaches occur? How are businesses responding, and what is the impact of these compromises on the business? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, showed that end-user vulnerabilities, attack volumes, and growing threat sophistication are leading to more breaches than ever. Organizations have deployed a wide range of tools and best practices for protecting networks and systems against attack. But a relentless adversary focus on end users is driving the need for a more people-focused approach to cybersecurity.

Download this report and get insights on how today's businesses assess the risks they faced in 2019 and the perceive risks going forward.

Digital Editorial Content: The Year in Security: 2019

by Dark ReadingDec 10, 2019

A look at the biggest news stories (so far) of 2019. This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse.

Here's what's inside:

  • The Year in Security: 2019
  • VPN Vulnerabilities Point Out Need for Comprehensive Remote Security
  • Baltimore Ransomware Attack Takes Strange Twist
  • Citrix Breach Underscores Password Perils
  • Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says
  • Plus a whole lot more...
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policy.
SpirionLookingGlass Cyber

This digital issue is sponsored by:
Spirion LookingGlass Cyber

Digital Editorial Content: Navigating the Deluge of Security Data

by Dark ReadingNov 12, 2019

In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. System logs, security tools, network telemetry, endpoint, and mobile reports may all provide clues that help reveal a cyberattack. We examine some examples of how enterprises can cull this data to find the clues they need.

Here's what's inside:

  • Navigating the Deluge of Security Data
  • Overburdened SOC Analysts Shift Priorities
  • Microsoft Debuts Azure Sentinel SIEM, Threat Experts Service
  • Better Cybersecurity Research Requires More Data Sharing
  • Don't Just Tune Your SIEM, Retune It
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policy.
ExtraHop NetworksCofenseSplunkCarbon BlackWhiteHat SecuritySpyCloudTenableeSentireDomainTools Reversing LabsThreat ConnectLaceworkBlueVoyantSignal Sciences

This digital issue is sponsored by: