Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: The State of IT Operations and Cybersecurity Operations

by Dark ReadingMay 13, 2019

Conventional wisdom about today's data centers holds that IT and network operations centers (NOCs) and security operations centers (SOCs) are separate organizations staffed by separate teams using different technologies. But in practice, IT operations and security operations are often tightly intertwined, involving overlapping functions and a wide range of common challenges.

How are today's IT operations teams working with security teams? Which functions are assigned to which teams, and how are their practices and technologies shared and connected?

In this survey, Dark Reading uncovered how IT operations and security teams work together, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so.

The information submitted is collected by both Informa and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: Building and Managing an IT Security Operations Program

by Dark ReadingMay 13, 2019

As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.

Here's what's inside:

• Building and Managing an IT Security Operations Program
• Here's What Happened When a SOC Embraced Automation
• Solving Security: Repetition or Redundancy?
• To Mitigate Advanced Threats, Put People Ahead of Tech
• Fighting Alert Fatigue with Actionable Intelligence

The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policy.
Attila Security •  WhiteHat Security •  Carbon Black, Inc.  •  AT&T Cybersecurity •  Ribbon Communications Inc. •  Splunk •  Lockpath, Inc. •  Columbus Collaboratory, LLC •  Digital Envoy •  AppGuard •  Check Point Software Technologies, Inc. •  Expanse, Inc. •  Irdeto USA, Inc. •  Aqua Security Software Inc. •  Illusive Networks •  Cofense •  DomainTools •  Slashnext •  ExtraHop Networks, Inc

This digital issue is sponsored by:


Presentation: 8 Steps to More Effective Small Business Security

by Dark ReadingApr 26, 2019

Small business face the same security challenges as large enterprises but with much smaller security teams. Here are 8 things to do to get the most from yours.


Whitepaper: Enterprise Trojan Detections Spike 200% in Q1 2019

by Dark ReadingApr 26, 2019

Enterprise cyberattacks mean big bucks for cybercriminals, who targeted businesses with a wave of Trojans and ransomware attacks throughout 2018 into the first quarter of this year. Trojan detections on business endpoints in the first quarter of 2019 increased more than 200% from the fourth quarter of 2018, and almost 650% from the first quarter of 2018, researchers found in the Malwarebytes Q1 Cybercrime Tactics and Techniques report. The Emotet Trojan has made a "total shift" away from consumers as operators focus on business targets, researchers say, with the exception of a few outlier spikes. Read more today!


Webcast: Dark Reading Virtual Event 2019

by Dark ReadingMar 21, 2019

Pending


Research Report: The State of Cyber Security Incident Response

by Dark ReadingFeb 27, 2019

Every day, enterprises wrestle with cybersecurity compromises of all sizes and types, ranging from simple viruses to complex, targeted online attacks. To successfully defend their data, IT organizations are developing teams, tools, and processes to quickly respond to new cyber threats and compromises - but not all of them are succeeding. In this survey, we find out how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Enterprises Are Developing Secure Applications

by Dark ReadingFeb 25, 2019

Today's enterprises are writing, buying, and deploying more web applications than at any point in the history of computing. With the rapid growth of cloud services and mobile technology, applications are available everywhere -- sometimes outside of the traditional IT infrastructure. This evolution has taken place so rapidly that many IT organizations are having trouble keeping up. This often leads to "out-of-sync" security, technology, and application development groups - and ultimately increases the risk to the organization. Our survey examined some of the most common challenges associated with securing the applications that enterprises use every day - those that are developed internally, and those that are purchased via the web or off the shelf.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: 5 Emerging Cyber Threats to Watch for in 2019

by Dark ReadingFeb 07, 2019

Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.

IN THIS ISSUE:


Webcast: Building a Cyber Defense for 2019

by Dark ReadingDec 12, 2018

A Dark Reading Virtual Event

When it comes to enterprise cybersecurity, the only constant is change. On one side, many organizations are being transformed by technological change, including the rapid movement toward cloud services, digital transformation, and the Internet of Things. On the other side, security teams are rethinking their defense strategies to respond to new threats such as ransomware, crypto mining, and next-generation malware. And as if that isn’t enough, major regulatory changes such as GDPR are putting new pressures on enterprise security and privacy.

What are the key cybersecurity steps that enterprises should be taking in the coming year? What are the critical changes that IT organizations should anticipate, and how should they prioritize their security initiatives? At this Dark Reading virtual event, security practitioners, industry visionaries, and technology developers come together to discuss the key changes to expect in the next 12 months – and how you can prepare for them.


Digital Editorial Content: The Year in Security 2018

by Dark ReadingDec 07, 2018

This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.

IN THIS REPORT:

  • Meltdown, Spectre Likely Just Scratch the Surface of Microprocessor Vulnerabilities
  • Cyberattack Aimed to Disrupt Opening of Winter Olympics
  • Fileless Attacks Jump 94% in First Half of 2018
  • Destructive 'VPNFilter' Attack Network Uncovered
  • Schneider Electric: TRITON/TRISIS Attack Used Zero-Day Flaw in its Safety Controller System, and a RAT
  • Memcached Servers Being Exploited in Huge DDoS Attacks
  • Hacker Unlocks 'God Mode' and Shares the 'Key'
  • 2018 on Track to Be One of the Worst Ever for Data Breaches
The information submitted is collected by both UBM Tech and our sponsors.
UBM Tech's privacy policy.
Securonix, Inc.BarklyReversing Labs CorpAlienVaultWhiteHat SecurityDomainToolsLogMeIn USA, Inc.SplunkExpanse, Inc.Anomali, Inc.Check Point Software Technologies, Inc.

This digital issue is sponsored by: