TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: [Strategic Security Report] Navigating the Threat Intelligence Maze

by Dark ReadingDec 15, 2017

Over the past few years, enterprises have gained access to vast new resources of information about cybersecurity threats. New services that collect information about external threats are being combined with existing technologies for analyzing security events. Enterprises are better able to assess potential threats by correlating data from multiple sources to measure risk and prioritize defenses. How are organizations harnessing these new information resources? In this survey, IT security professionals offer insight on how they are collecting, analyzing, and using threat intelligence to root out sophisticated threats and improve their overall defenses.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Whitepaper: [Strategic Security Report] Cloud Security's Changing Landscape

by Dark ReadingNov 01, 2017

The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The survey will reveal how quickly cloud services and applications are expanding, the tools and services that organizations are employing to protect them, and enterprise plans for deploying next-generation cloud security technologies such as encryption, identity management, and cloud access security brokers.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The State of Ransomware

by Dark ReadingOct 03, 2017

Ransomware is hitting enterprises at an alarming rate. Is your organization prepared? Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. Now well beyond the incipient stage of opportunistic attacks, this automated form of blackmail has increased in prevalence and sophistication. The malware now targets organizations of all sizes as the bad guys look for ways to extort money and create trouble for businesses by taking their data hostage. This new report from Dark Reading queried 220 IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: [Strategic Security Report] Assessing Cybersecurity Risk

by Dark ReadingJun 30, 2017

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, delivers insight on how today's enterprises evaluate the risks they face. In addition to providing survey data on the implementation of risk metrics and best practices, this report offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things. The report also provides data on how organizations use threat intelligence, and how they factor that intelligence into their risk model.


Research Report: The Impact of a Security Breach 2017

by Dark ReadingJun 29, 2017

Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future


Research Report: [Strategic Security Report] How Enterprises Are Attacking the IT Security Problem

by Dark ReadingJun 26, 2017

In 2016, enterprises encountered a range of new exploits and threats -- including ransomware and state-sponsored attacks -- and developed new plans of defense. How will these organizations be investing their cybersecurity budgets and staffing in the next 12 months? What tools and best practices do they consider most important, and which emerging technologies are they implementing? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources.


Research Report: The Dark Reading Security Spending Survey

by Dark ReadingJun 13, 2017

Enterprises are spending an unprecedented amount of money on IT security — where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year.


Research Report: Surviving the IT Security Skills Shortage

by Dark ReadingMay 31, 2017

Cybersecurity professionals are in high demand — and short supply. More than 80% of the organizations Dark Reading surveyed in its 2017 Security Staffing Survey plan to keep their security staffing levels the same or increase them in 2017, while only 14% believe there are plenty of skilled security pros available. Read this report to learn strategies for getting through the drought.


Whitepaper: 20 Cybersecurity Startups To Watch - 2016

by Dark ReadingApr 05, 2017

With an epic year in cybersecurity venture funding behind us and lots of money still flowing to startup coffers in 2016, expectations continue to grow for a blossoming crop of security startups. Yes, the hype may also be growing to epic proportions as everyone tries to outcompete with one another's game-changing, next generation, big data, intelligence-driven, platform-based silver bullet gizmos. But amidst all of the marketing puffery, there's substance to a lot of the innovation out there, as the latest class of newcomers tries to help practitioners fix what's broken in infosec today.

Here's a cheat sheet of some of the movers and shakers most likely to continue making waves in this year. These firms are primarily early- to middle-stage startups who've met some distinction in the past year. That might mean launching into a greenfield niche with a decent seed round, snagging a recent funding round in the last few months, or earning huge Series A or B rounds. Most of these firms have launched in the last three years. And many have earned distinction from their executive roster, with a number of well-known or otherwise highly credentialed security veterans at the helm.


Research Report: Secure Application Development - New Best Practices

by Dark ReadingDec 12, 2016

The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report to learn about the new best practices for secure application development.