Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Digital Editorial Content: 7 Threats & Disruptive Forces Changing the Face of Cybersecurity

by Dark ReadingAug 08, 2019

In this Tech Digest, Dark Reading examines the research revealed at Black Hat USA and takes a look at some of the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today. As digital disruption and advances in emerging technology such as AI, the Internet of Things, and automation enmesh IT into every part of society, cybersecurity grows more important than ever. Read this Report to learn more about the biggest emerging threats and disruptive forces challenging cybersecurity.

Here's what's inside:
• Building and Managing an IT Security Operations Program
• 7 Threats & Disruptive Forces That Are Changing the Face of Cybersecurity
• 'Human Side-Channels': Behavioral Traces We Leave Behind
• Researchers Poke Holes in Siemens Simatic S7 PLCs
• Inside MLS, the New Protocol for Secure Enterprise Messaging
• With GDPR's 'Right of Access,' Who Really Has Access?

The information submitted is collected by both Informa Tech and our sponsors.Informa Tech's privacy policy.
ExtraHop Networks •  LookingGlass Cyber •  Cofense •  Splunk •  eSentire •  Carbon Black •  WhiteHat Security •  CyberGRX •  Cymulate •  Aqua Security •  Synack •  BlueVoyant •  DarkTrace •  AT&T Cybersecurity  •  DomainTools  • 

This digital issue is sponsored by:
Sponsor_logos


Webcast: What to Do When Hackers Attack

by Dark ReadingJun 26, 2019

The worst has happened. Online attackers have penetrated your cyber defenses and are threatening your most sensitive data. What should you do now? In this fascinating and educational virtual event, you will hear advice and recommendations from some of the cybersecurity industry’s top experts and speakers on the critical issues of breach investigation and incident response.

This all-day online conference, produced by the editors of Dark Reading, will help you and your organization prepare for those “very bad days” when you suspect that your mission-critical data has been compromised. Attend the event and you’ll hear about tools and best practices for detecting a breach – even when it’s well-obfuscated – and how to analyze multiple indications of compromise to reveal a sophisticated attack. You’ll also receive first-hand expertise on what to do in the first hours of a major breach, whether to pull the plug on infected systems, and when to call in law enforcement. Best of all, you’ll get expert advice on how to determine the extent of a data compromise, how to stop it, how to remediate your systems, and how to handle legal and business consequences that may follow.


Digital Editorial Content: Dark Reading - Check out Our Newsletters

by Dark ReadingJun 24, 2019

Subscribe to the Dark Reading newsletters and get your daily/weekly dose of news, analysis, and glimpse into the chaos and mystery of network and data security.


Research Report: How Enterprises Are Using IT Threat Intelligence

by Dark ReadingMay 29, 2019

Concerns over nation-state actors and other security threats are driving enterprises to rethink the way they collect and analyze cybersecurity data. A high percentage of organizations are seeking to augment their internal telemetry with external threat data so they can identify and respond to potential data compromises faster. However, collecting and analyzing threat intelligence is no easy task — early implementers report being slowed by manual data correlation and analysis processes.


Research Report: The State of IT Operations and Cybersecurity Operations

by Dark ReadingMay 13, 2019

Conventional wisdom about today's data centers holds that IT and network operations centers (NOCs) and security operations centers (SOCs) are separate organizations staffed by separate teams using different technologies. But in practice, IT operations and security operations are often tightly intertwined, involving overlapping functions and a wide range of common challenges.

How are today's IT operations teams working with security teams? Which functions are assigned to which teams, and how are their practices and technologies shared and connected?

In this survey, Dark Reading uncovered how IT operations and security teams work together, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so.

The information submitted is collected by both Informa and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: Building and Managing an IT Security Operations Program

by Dark ReadingMay 13, 2019

As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.

Here's what's inside:

• Building and Managing an IT Security Operations Program
• Here's What Happened When a SOC Embraced Automation
• Solving Security: Repetition or Redundancy?
• To Mitigate Advanced Threats, Put People Ahead of Tech
• Fighting Alert Fatigue with Actionable Intelligence

The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policy.
Attila Security •  WhiteHat Security •  Carbon Black, Inc.  •  AT&T Cybersecurity •  Ribbon Communications Inc. •  Splunk •  Lockpath, Inc. •  Columbus Collaboratory, LLC •  Digital Resolve •  AppGuard •  Check Point Software Technologies, Inc. •  Expanse, Inc. •  Irdeto USA, Inc. •  Aqua Security Software Inc. •  Illusive Networks •  Cofense •  DomainTools •  Slashnext •  ExtraHop Networks, Inc

This digital issue is sponsored by:


Presentation: 8 Steps to More Effective Small Business Security

by Dark ReadingApr 26, 2019

Small business face the same security challenges as large enterprises but with much smaller security teams. Here are 8 things to do to get the most from yours.


Whitepaper: Enterprise Trojan Detections Spike 200% in Q1 2019

by Dark ReadingApr 26, 2019

Enterprise cyberattacks mean big bucks for cybercriminals, who targeted businesses with a wave of Trojans and ransomware attacks throughout 2018 into the first quarter of this year. Trojan detections on business endpoints in the first quarter of 2019 increased more than 200% from the fourth quarter of 2018, and almost 650% from the first quarter of 2018, researchers found in the Malwarebytes Q1 Cybercrime Tactics and Techniques report. The Emotet Trojan has made a "total shift" away from consumers as operators focus on business targets, researchers say, with the exception of a few outlier spikes. Read more today!


Research Report: The State of Cyber Security Incident Response

by Dark ReadingFeb 27, 2019

Every day, enterprises wrestle with cybersecurity compromises of all sizes and types, ranging from simple viruses to complex, targeted online attacks. To successfully defend their data, IT organizations are developing teams, tools, and processes to quickly respond to new cyber threats and compromises - but not all of them are succeeding. In this survey, we find out how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.


Research Report: How Enterprises Are Developing Secure Applications

by Dark ReadingFeb 25, 2019

Today's enterprises are writing, buying, and deploying more web applications than at any point in the history of computing. With the rapid growth of cloud services and mobile technology, applications are available everywhere -- sometimes outside of the traditional IT infrastructure. This evolution has taken place so rapidly that many IT organizations are having trouble keeping up. This often leads to "out-of-sync" security, technology, and application development groups - and ultimately increases the risk to the organization. Our survey examined some of the most common challenges associated with securing the applications that enterprises use every day - those that are developed internally, and those that are purchased via the web or off the shelf.