Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: How Data Breaches affect the Enterprise

by Dark ReadingDec 10, 2019

Despite increased enterprise investments in cybersecurity, 2019 is on track to be the worst year ever for data breaches. A growing number of organizations are experiencing significant financial losses, brand damage, and customer alienation issues as a result of the increased breach activity.

How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, showed that end-user vulnerabilities, attack volumes, and growing threat sophistication are leading to more breaches than ever. Organizations have deployed a wide range of tools and best practices for protecting networks and systems against attack. But a relentless adversary focus on end users is driving the need for a more people-focused approach to cybersecurity.

Download this report and get insights on how today's enterprises assess the risks they faced in 2019 and the perceive risks going forward.

The information submitted is collected by both Informa Tech and our sponsor eSentire. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: The Year in Security: 2019

by Dark ReadingDec 10, 2019

A look at the biggest news stories (so far) of 2019. This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse.

Here's what's inside:

  • The Year in Security: 2019
  • VPN Vulnerabilities Point Out Need for Comprehensive Remote Security
  • Baltimore Ransomware Attack Takes Strange Twist
  • Citrix Breach Underscores Password Perils
  • Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says
  • Plus a whole lot more...
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policy.
SpirionLookingGlass Cyber

This digital issue is sponsored by:
Spirion LookingGlass Cyber


Digital Editorial Content: Navigating the Deluge of Security Data

by Dark ReadingNov 12, 2019

In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. System logs, security tools, network telemetry, endpoint, and mobile reports may all provide clues that help reveal a cyberattack. We examine some examples of how enterprises can cull this data to find the clues they need.

Here's what's inside:

  • Navigating the Deluge of Security Data
  • Overburdened SOC Analysts Shift Priorities
  • Microsoft Debuts Azure Sentinel SIEM, Threat Experts Service
  • Better Cybersecurity Research Requires More Data Sharing
  • Don't Just Tune Your SIEM, Retune It
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policy.
ExtraHop NetworksCofenseSplunkCarbon BlackWhiteHat SecuritySpyCloudTenableeSentireDomainTools Reversing LabsThreat ConnectLaceworkBlueVoyantSignal Sciences

This digital issue is sponsored by:
Sponsor_logos


Webcast: Strategies for Protecting Mission-Critical Data

by Dark ReadingNov 06, 2019

Whether it’s customer lists, intellectual property, or a secret recipe, your mission-critical data is what makes your organization unique – the lifeblood of your enterprise. Yet, with one shrewd exploit, an online attacker – or even one of your own employees – could break the security of that critical information. What steps should you be taking to protect it?

Strategies For Protecting Mission-Critical Data, a free, all-day online conference produced by the editors of Dark Reading, offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. You’ll get insight on how to store critical information securely, and how to ensure its security when it is passed across networks. Top security experts will discuss data encryption strategies, on-premises infrastructure defenses, and how to protect mission-critical data across cloud services, network providers, and partner/supplier environments. You’ll get expert viewpoints and recommendations on how to protect your mission-critical data, and advice on how to identify and protect sensitive data that might be handled outside the IT department’s knowledge or control.


Webcast: Strategies for Protecting Mission-Critical Data

by Dark ReadingNov 06, 2019

Whether it’s customer lists, intellectual property, or a secret recipe, your mission-critical data is what makes your organization unique – the lifeblood of your enterprise. Yet, with one shrewd exploit, an online attacker – or even one of your own employees – could break the security of that critical information. What steps should you be taking to protect it?

Strategies For Protecting Mission-Critical Data, a free, all-day online conference produced by the editors of Dark Reading, offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. You’ll get insight on how to store critical information securely, and how to ensure its security when it is passed across networks. Top security experts will discuss data encryption strategies, on-premises infrastructure defenses, and how to protect mission-critical data across cloud services, network providers, and partner/supplier environments. You’ll get expert viewpoints and recommendations on how to protect your mission-critical data, and advice on how to identify and protect sensitive data that might be handled outside the IT department’s knowledge or control.

Among the topics that will be covered at Strategies for Protecting Mission-Critical Data:

  • Processes and best practices for identifying sensitive data across the enterprise
  • Tips and tools for ensuring that even “trusted users” cannot access or exfiltrate important data without authorization
  • The latest technologies and strategies for protecting on-premises infrastructure, including networks, servers, and storage systems
  • Strategies for encrypting sensitive information, both in storage and in motion across networks
  • Methods for ensuring that business partners handle sensitive information as securely as your own users
  • Recommendations for working with cloud operators and other service providers to ensure the security of data traveling across their networks
  • Special steps you can take to provide extra protection for your most essential data and information

If you want to know more about the available tools and best practices for protecting mission-critical data from cyberattack – and get some help choosing the right methods and technologies for your own organization -- then this virtual event is for you. Register today!


Research Report: Rethinking Enterprise Data Defense

by Dark ReadingNov 01, 2019

What are the chief concerns of today's enterprise data defenders? What technologies and best practices do they find to be most effective in preventing compromises, and what methods have they found to make better use of their staffing and funding resources? In this survey we ask security professionals for insight on what they're doing that works - and what doesn't. Readers will get advice and recommendations from their peers on how to invest their IT security resources, and how to mitigate the latest attacks and exploits.

The information submitted is collected by both Informa and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Assessing Cybersecurity Risk in Today's Enterprise

by Dark ReadingOct 29, 2019

Security leaders are struggling to understand their organizations' risk exposure. While many are confident in their security strategies and processes, they're also more concerned than ever about getting breached.

Dark Reading's annual 2019 Strategic Security survey reveals that many companies are uncertain about their data breach exposure because of growing threat sophistication, increasing attack volumes, and many other factors. A high percentage of IT leaders see employees as presenting as big a breach risk as external cybercriminals and nation-state actors.

Download this report and get insights on how today's enterprises assess and perceive the risks they face in 2019.

The information submitted is collected by both Informa Tech and our sponsor Anomali. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: 2019 Online Malware and Threats: A Profile of Today's Security Posture

by Dark ReadingSep 30, 2019

Dark Reading's 2019 Malware and Threat Report shows that cybercriminals have ramped up their attack volumes sharply-- especially those involving phishing attempts, ransomware, and business email compromise (BEC). The constant pummeling is putting new strain on risk assessment and threat response processes in many organizations.

This report based on our 2019 survey reveals a high level of concern over several new and emerging threats, including attacks on cloud service providers, BEC scams, and attacks that use artificial intelligence techniques. For many organizations, risk assessment and response prioritization continue to be major challenges, and respondents are becoming frustrated by their vulnerability to human errors and negligence. Find out more by reading the report today.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:

  • Details
  • Research Report
  • 400 likes

Digital Editorial Content: 7 Threats & Disruptive Forces Changing the Face of Cybersecurity

by Dark ReadingAug 08, 2019

In this Tech Digest, Dark Reading examines the research revealed at Black Hat USA and takes a look at some of the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today. As digital disruption and advances in emerging technology such as AI, the Internet of Things, and automation enmesh IT into every part of society, cybersecurity grows more important than ever. Read this Report to learn more about the biggest emerging threats and disruptive forces challenging cybersecurity.

Here's what's inside:
• Building and Managing an IT Security Operations Program
• 7 Threats & Disruptive Forces That Are Changing the Face of Cybersecurity
• 'Human Side-Channels': Behavioral Traces We Leave Behind
• Researchers Poke Holes in Siemens Simatic S7 PLCs
• Inside MLS, the New Protocol for Secure Enterprise Messaging
• With GDPR's 'Right of Access,' Who Really Has Access?

The information submitted is collected by both Informa Tech and our sponsors.Informa Tech's privacy policy.
ExtraHop Networks •  LookingGlass Cyber •  Cofense •  Splunk •  eSentire •  Carbon Black •  WhiteHat Security •  CyberGRX •  Cymulate •  Aqua Security •  Synack •  BlueVoyant •  DarkTrace •  AT&T Cybersecurity  •  DomainTools  • 

This digital issue is sponsored by:
Sponsor_logos


Webcast: What to Do When Hackers Attack

by Dark ReadingJun 26, 2019

The worst has happened. Online attackers have penetrated your cyber defenses and are threatening your most sensitive data. What should you do now? In this fascinating and educational virtual event, you will hear advice and recommendations from some of the cybersecurity industry’s top experts and speakers on the critical issues of breach investigation and incident response.

This all-day online conference, produced by the editors of Dark Reading, will help you and your organization prepare for those “very bad days” when you suspect that your mission-critical data has been compromised. Attend the event and you’ll hear about tools and best practices for detecting a breach – even when it’s well-obfuscated – and how to analyze multiple indications of compromise to reveal a sophisticated attack. You’ll also receive first-hand expertise on what to do in the first hours of a major breach, whether to pull the plug on infected systems, and when to call in law enforcement. Best of all, you’ll get expert advice on how to determine the extent of a data compromise, how to stop it, how to remediate your systems, and how to handle legal and business consequences that may follow.