Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: How IT Security Organizations are Attacking the Cybersecurity Problem

by Dark ReadingSep 16, 2020

In 2019, enterprises encountered a wide range of new exploits and threats, as well as new challenges associated with online privacy issues and regulations. How will these organizations be investing their cybersecurity budgets and staffing in the next 12 months? What tools and best practices do they consider most important, and which emerging technologies are they implementing? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Special Report: Understanding Your Cyber Attackers

by Dark ReadingAug 19, 2020

To prepare an effective defense of your enterprise data, you need to know something about the types of attackers you're facing — and the methods they use. In this Dark Reading special report, you'll learn about the strategies you can employ to evaluate your enterprise's "attack surface" and the potential threats that affect organizations like yours.

In this comprehensive report, you'll get insight on how to evaluate your defenses through penetration and red-teaming, as well as advice and tips on how to use threat intelligence tools to help gauge the risk faced by your specific organization. You'll also get recommendations on how to implement threat hunting practices that can help you identify potential attackers and exploits before they hit your enterprise.

If you want to get a better sense of the threats that might be coming — and your organization's vulnerability to those threats — this special report is a must-read.

Inside this report:

  • Why and How to Understand Your Cyber Attackers
  • How Advanced Attackers Take Aim at Office 365
  • Criminals Turn to IM Platforms to Avoid Law Enforcement Scrutiny
  • Mobile Phishing Attacks Increase Sharply
  • Targeted Discovery: Why Attack Surface Management Isn't Enough

The information submitted is collected by both Informa Tech and our sponsor Randori. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: 2020 State of Cybersecurity Operations and Incident Response

by Dark ReadingAug 14, 2020

In recent years, enterprises have responded to a growing volume of sophisticated cyber-attacks by building security operations centers (SOCs) and incident response programs. Faced with this growing number of exploits, a shortage of trained workers, and the growing sophistication of online attackers, security operations teams were under enormous pressure at the outset of 2020.

In March, however, these challenges were compounded when the coronavirus pandemic focused most organizations to turn desktop-oriented IT environments into remote, work-from-home, and mobile environments

In this in-depth report, Dark Reading and Omdia Research present the results of a detailed survey of SOC staff, incident response teams, and other IT security professionals. This report provides unique data on the activities, attitudes, and concerns of security operations teams, including insights on what's working -- and what isn't -- in the SOC.

Download this report today from Dark Reading to get an inside look at how cybersecurity teams are coping with new cyber threats in today's environment.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: 7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk

by Dark ReadingAug 10, 2020

In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.

Here's a preview of what's inside:

  • 7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
  • Vulnerabilities Declining in Open Source, but Slow Patching Still a Problem
  • Firmware Flaw Allows Attackers to Evade Security on Some Home Routers
  • Cisco Patches Flaw in Webex Videoconferencing App
The information submitted is collected by both Informa Tech and our sponsors.Informa Tech's privacy policy.
DomainToolsWhiteHat SecurityExtraHopCiscoMandianteSentireTrustwaveAir Force Civilian ServiceReciprocity,Inc.BlueVoyantTenableFarsight SecurityNeustar, Inc.IronNet Cybersecurity

This digital issue is sponsored by:
Tech Digest Sponsor Logos


Webcast: Doing More IT With Less

by Dark ReadingJul 23, 2020

If there is one universal truth among IT organizations, it's a shortage of budget.

IT professionals probably entered 2020 wondering whether you could do the job with the resources they had. Add in COVID-19 and a crashing economy, and we now have our answer.

This information-packed event looks at some of the key strategies your IT organization can use to stretch your technology, rethink costly processes, and create new ways of doing business on a shoestring. Top IT practitioners, leaders, and experts will share proven methods for rethinking operational spending, while still supporting the organization’s need to innovate in new ways.


Research Report: Special Report: The Changing Face of Threat Intelligence

by Dark ReadingJul 21, 2020

Ten years ago, enterprises' best "threat intel" was limited to what they could read on a few websites or what was unveiled on Microsoft's Patch Tuesday. Today, however, enterprises are overwhelmed with options for receiving new information about cyber threats, ranging from commercial feeds to industry ISACs to specialized tools and services that collect, analyze, and prioritize threat data. How should enterprises aggregate, collate, and interpret threat data? How can they integrate threat data with operational systems to develop automated responses and remediation processes? In this special report, Dark Reading takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response.

Inside this report:

  • How InfoSec Pros Can Help Intelligence
  • Security & Trust Ratings Proliferate: Is That a Good Thing?
  • Making the Case for Process Documentation in Cyber Threat Intel
  • Prove Your Readiness to Defend Against Attacks by Operationalizing Threat Intelligence

The information submitted is collected by both Informa Tech and our sponsor Mandiant. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Special Report: Computing's New Normal, a Dark Reading Perspective

by Dark ReadingJul 01, 2020

The COVID-19 pandemic created new models of computing almost literally overnight.

This special report examines how IT security organizations have adapted to this "new normal" of computing and what the long-term effects will be. Read the report and get a unique set of perspectives on issues ranging from new threats and vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The Threat from the Internet—and What Your Organization Can Do About It

by Dark ReadingJun 19, 2020

For most enterprises, the increasing use of the Internet has created new business opportunities, greater efficiencies, and a greenfield for innovation. However, online attackers have launched a wide range of Internet-borne attacks, ranging from DDoS to cloud data leaks to infiltration of e-commerce sites. And with the world relying more heavily on Web-based communication during the COVID-19 pandemic, new threats are emerging. This report by Dark Reading and sponsored by CyCognito, describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business.

This report will cover:
• How cyberattackers are adapting their own techniques to more effectively compromise businesses using work-from-home models
• How to defend against attackers that abuse cloud services, Web APIs and agile development
• What security questions you should ask to companies that provide your e-commerce, content management, collaboration, hosting, cloud storage and other online services
• Why it is essential for businesses to identify the blind spots in their computing environment

The information submitted is collected by both Informa Tech and our sponsor CyCognito. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Webcast: Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingJun 17, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.

For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.

Preparing For, Detecting, and Managing a Critical Data Breach -- a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll hear about tools and best practices for detecting a breach, even when it’s well-obfuscated. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.

Among the topics that will be covered at Preparing For, Detecting, and Managing a Critical Data Breach:

  • Strategies for creating and rehearsing an enterprise-wide breach response plan
  • Best practices and technologies for detecting potential intrusions or infections
  • Recommendations for building and managing an incident response plan
  • Methods for limiting the scope and impact of a data breach
  • How to determine the extent of a breach, and what system/partners may be affected
  • Strategies for speeding the remediation process
  • Limiting the costs and liabilities associated with cyber breaches
  • Lessons learned: how to monitor and collect data on future threats

If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow -- then this virtual event is for you. Register today!


Webcast: Preparing For, Detecting, and Managing a Critical Data Breach

by Dark ReadingJun 17, 2020

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.

For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.

Preparing For, Detecting, and Managing a Critical Data Breach -- a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll hear about tools and best practices for detecting a breach, even when it’s well-obfuscated. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.

Among the topics that will be covered at Preparing For, Detecting, and Managing a Critical Data Breach:

  • Strategies for creating and rehearsing an enterprise-wide breach response plan
  • Best practices and technologies for detecting potential intrusions or infections
  • Recommendations for building and managing an incident response plan
  • Methods for limiting the scope and impact of a data breach
  • How to determine the extent of a breach, and what system/partners may be affected
  • Strategies for speeding the remediation process
  • Limiting the costs and liabilities associated with cyber breaches
  • Lessons learned: how to monitor and collect data on future threats

If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow -- then this virtual event is for you.