TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Digital Editorial Content: 10 Best Practices That Could Reshape Your IT Security Department

by Dark ReadingNov 06, 2018

This is Dark Reading's November Tech Digest, explores ten best practices that could reshape IT security departments.

IN THIS REPORT:

  • 10 Best Practices That Could Reshape Your IT Security Department
  • Managing Data the Way We Manage Money
  • The Cloud Security Conundrum: Assets vs. Infrastructure
  • Think Like an Attacker: How a Red Team Operates
The information submitted is collected by both UBM Tech and our sponsors.
UBM Tech's privacy policy.
CofenseAnomali, Inc.Securonix, Inc.Carbon BlackReliaQuest LLCLookingGlass Cyber Solutions, Inc.Cylance Inc.Arctic Wolf NetworksDigital GuardianSplunkSynopsys, Inc.Cyxtera Technologies, Inc.TwistlockChronicle LLC

This digital issue is sponsored by:


Research Report: Online Malware and Threats: A Profile of Today's Security Posture

by Dark ReadingOct 23, 2018

In 2016, enterprises encountered a range of new exploits and threats -- including ransomware and state-sponsored attacks -- and developed new plans of defense. How will these organizations be investing their cybersecurity budgets and staffing in the next 12 months? What tools and best practices do they consider most important, and which emerging technologies are they implementing?

This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The Risk Management Struggle

by Dark ReadingSep 18, 2018

Dark Reading's 2018 Strategic Security Survey of 300 IT and security professionals indicates that a majority of organizations are struggling to implement a risk-based approach to security — even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Research Report: How Data Breaches Affect the Enterprise

by Dark ReadingAug 30, 2018

Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: 10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.

IN THIS REPORT:

  • 10 Emerging Threats Every Enterprise Should Know About
  • Trading Platforms Riddled with Severe Flaws
  • Cracking Cortana: The Dangers of Flawed Voice Assistants
  • Demystifying Mental Health in the Infosec Community
  • New Hack Weaponizes the Web Cache
The information submitted is collected by both UBM Tech and our sponsors.
UBM Tech's privacy policy.
CofenseHackerOneIrdeto USA, Inc.Panda SecurityExtraHop NetworksIllusive NetworksCheck Point Software Technologies, Inc.

This digital issue is sponsored by:


Digital Editorial Content: The Biggest Cybersecurity Breaches of 2018 (So Far)

by Dark ReadingJul 19, 2018

This is Dark Reading's July Tech Digest explores the biggest cybersecurity breaches of the first half of 2018.

IN THIS REPORT:

  • The Biggest Cybersecurity Breaches of 2018 (So Far)
  • LA County Nonprofit Exposes 3.2M PII Files via Unsecured S3 Bucket
  • SunTrust Ex-Employee May Have Stolen Data on 1.5 Million Bank Clients
  • Sears & Delta Airlines Are Latest Victims of Third-Party Security Breach
  • Panera Bread Leaves Millions of Customer Records Exposed Online
  • Hudson's Bay Brands Hacked, 5 Million Credit Card Accounts Stolen
  • Under Armour App Breach Exposes 150 Million Records
  • Baltimore Hit with Hack on 911 System
  • Hack Costs Coincheck Cryptocurrency Exchange $530 Million
The information submitted is collected by both UBM Tech and our sponsors.
UBM Tech's privacy policy.
AlienVaultAnomali, Inc.Arctic Wolf NetworksBarklyCarbon BlackCisco UmbrellaDomainToolsGrammaTech, Inc.ibossSplunk

This digital issue is sponsored by:


Research Report: The State of IT and Cybersecurity

by Dark ReadingJun 11, 2018

As cybersecurity has grown and become more critical in recent years, it increasingly has become viewed as a discipline separate from general IT. In many companies, the security department works independently of the IT department; in some companies, the chief information security officer (CISO) reports to someone other than the head of IT.

This report from Dark Reading shows today's IT groups play a critical role in information security — a role that is more extensive and more integral than people might have thought. This is especially true in areas such as endpoint security, patch management, and identity and access control, as well as the security of applications, mobile devices, and the electronic supply chain.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Presentation: [Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.


Presentation: [Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.


Presentation: [Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 26, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.