TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: Secure Application Development - New Best Practices

by Dark ReadingDec 12, 2016

The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, sponsored by CloudPassage, to learn about the new best practices for secure application development.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: Dark Reading Tech Digest: Cybersecurity Threats

by Dark ReadingDec 07, 2016

In this special digital edition of Dark Reading, we cover how business executives should plan for and respond to cybersecurity threats. This issue includes:

  • Five Things Every Business Executive Should Know About Cybersecurity
  • Why Poor Cyber Hygiene Invites Risk
  • The 4 Biggest Mistakes Businesses Make Trying to Secure Endpoints
  • Improving the Security Conversation for CIOs, CISOs, and Board Members
Download the issue today!

The information submitted is collected by both UBM and our sponsors. Click here to view our sponsor privacy policies.

This digital issue is sponsored by:


Research Report: The Top Cybersecurity Risks And How Enterprises Are Responding

by Dark ReadingOct 01, 2016

The information security landscape is a constantly shifting risk environment. Today's IT security department must manage both internal and external threats' ranging from malware to mobile device vulnerabilities, to cloud security and ransomware. Download the Dark Reading 2016 Strategic Security Survey to gain insight into how security professionals view these risks, and how they are addressing them.

Download this Dark Reading Strategic Security Report now!

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This digital issue is sponsored by:


Research Report: Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches

by Dark ReadingSep 14, 2016

Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.

Download this Dark Reading Strategic Security Report now!


Research Report: How Enterprises Are Attacking the IT Security Enterprise Challenge

by Dark ReadingSep 06, 2016

Information Security professionals have been making hard choices on the fly for some time, but the unrelenting nature of attacks and threats to users have raised the stakes.

To learn more about what organizations are doing to tackle these threats, InformationWeek and Dark Reading, sponsored by VMware®, surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This digital issue is sponsored by:


Research Report: Dark Reading 2016 Security Salary Survey

by Dark ReadingSep 01, 2016

Cybersecurity spending is at an all-time high, but is the increase in spending having impact on the salaries of security professionals? Download your copy of the Dark Reading 2016 Salary Survey and find out today!

Also covered in this report:

Security Pro Shortage: Employers need to rethink the ways they budget for in-demand IT positions like those in information security.

Priorities and Skills: What other factors are affecting IT security hiring, retention, and job satisfaction? Our survey offers insight.

Download your copy of the Dark Reading 2016 Security Salary Survey report now!


Digital Editorial Content: Dark Reading Tech Digest: Identity Management

by Dark ReadingAug 04, 2016

In this special digital edition of Dark Reading, we take in-depth look at Identity Management.

Mobility and cloud services are altering the concept of user identity. Want to learn how to keep up? Read this issue today!

  • Identity as the New Perimeter: With the added complication of authenticating new devices, cloud services, and sensors, old identity access management (IAM) architectures are growing obsolete, and the stakes are increasing as well.
  • IAM's Next Challenge - Analytics: Perhaps the most important security capability that a fully built-out identity ecosystem can offer is the ability to control access and track behavior based on context.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsors privacy policy.

This digital issue is sponsored by:


Digital Editorial Content: Must Read The Ransomware Edition

by Dark ReadingJun 28, 2016

Download Your Copy of the Dark Reading Must Read Today!

IN THIS ISSUE:

  • Ransomware Spikes, Tries New Tricks
  • Crowdsourcing The Dark Web: A One-Stop Ran$om Shop
  • How To Best Back Up Your Data In Case Of A Ransomware Attack
  • Imagining The Ransomware Of The Future
  • Here Are 4 Vulnerabilities Ransomware Attacks Are Exploiting Now

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsors privacy policy.

This digital issue is sponsored by:


Digital Editorial Content: Dark Reading Tech Digest: Mobile Security

by Dark ReadingMar 08, 2016

The mobile devices that your employees use to access work data - your intellectual property - are more vulnerable to attack than ever.

What are these emerging weaknesses, and how are attackers exploiting them? In this special digital edition of Dark Reading, we cover an in-depth look at the latest threats and vulnerabilities and just as importantly, we offer advice and recommendations from top experts on how you can mitigate these mobile threats - or prevent them from infecting your users' systems in the first place.

The information submitted is collected by both UBM and our sponsors. Click here to view our sponsor privacy policies.

This digital issue is sponsored by:


Infographic: Get Smart About Threat Intelligence

by Dark ReadingJun 17, 2015

Is threat intel the best way to improve defenses and stay ahead of new and complex attacks? Nearly 400 respondents to Dark Reading's new Threat Intelligence Survey seem to think so.