Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: Incident Readiness and Building Response Playbook

by Dark ReadingJul 14, 2021

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this special report, learn the Xs and Os of any good security incident readiness and response playbook.

What's Inside:

  • Developing an Incident Readiness and Response Playbook
  • How to Create an Incident Response Plan From the Ground Up
  • 10 Benefits of Running Cybersecurity Exercises
  • Despite Heightened Breach Fears, Incident Response Capabilities Lag
  • Motorola Solutions Perspective: Securing Mission-Critical Technology

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Webcast: Finding and Stopping Enterprise Data Breaches

by Dark ReadingJun 24, 2021

It’s the nightmare of every cybersecurity professional. Not only have cybercriminals breached your enterprise’s IT defenses and compromised critical data, but it wasn’t your team that discovered the compromise. Not only did you fail to keep the attacker out – you failed to detect the breach when it happened.

A new virtual event is designed to help you prevent that nightmare from happening to you. Finding and Stopping Enterprise Data Breaches -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the latest and most effective methods for detecting threats and compromises, as well as the key steps you should take to mitigate them. You’ll get a look at the next wave of threat detection tools and practices, as well as expert advice and recommendations on how to respond to a data breach. Top security experts and researchers will discuss ways to discover sophisticated and targeted exploits, even when they are well obfuscated. Best of all, you’ll get insight on what to do when you’ve discovered those compromises, including how to limit their impact and when to contact law enforcement.

Among the topics that will be covered at Finding and Stopping Enterprise Data Breaches:

  • A look at some of the latest tools and practices for detecting a compromise, including EDR and xDR
  • Insight on how your organization can use next-generation technologies such as AI and machine learning to uncover sophisticated attacks
  • Methods for analyzing system logs and threat intelligence to help detect hidden attacks
  • Critical actions to take when you suspect your data has been compromised
  • Key steps to mitigate a compromise and limit its impact
  • Building blocks of an effective incident response plan
  • How to staff and train your cybersecurity analysts and first responders

If you want to get up to date on the latest tools and practices for detecting cyber attacks – and limit their impact -- then this virtual event is for you.


Research Report: The State of Malware Threats

by Dark ReadingJun 09, 2021

The SolarWinds attack, disruptions caused by COVID-19, zero-day exploits, and emerging threats: It's been quite a year, and security teams have their work cut out for them when trying to stay a step ahead of malware-wielding criminals.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The State of Cybersecurity Incident Response

by Dark ReadingMay 01, 2021

Every day, enterprises wrestle with cybersecurity compromises of all sizes and types, ranging from simple viruses to complex, targeted online attacks. And with the onset of COVID-19 in early 2020, a new wave of online attacks created more data breach concerns than ever before. To successfully defend their data, IT organizations are developing teams, tools, and processes to quickly respond to new cyber threats and compromises — but not all of them are succeeding.

Download Dark Reading's The State of Incident Response, sponsored by Unit 42 by Palo Alto Networks, to learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Whitepaper: Dark Reading Report: Battle for the Endpoint

by Dark ReadingApr 02, 2021

The idea that thousands of work-from-home employees using personal printers and home Wi-Fi might become the norm for some companies was unthinkable not long ago. But, for the IT security manager, the concept of "endpoint security" has evolved significantly. How is your enterprise approaching the endpoint security problem?

In this Tech Insights report by Dark Reading, and sponsored by Palo Alto Networks, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user might employ. You'll also get insight on how to develop a consistent endpoint security strategy that works for all of your end users, no matter what their roles or applications.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Webcast: Cybersecurity’s Next Wave: What Every Enterprise Should Know

by Dark ReadingMar 25, 2021

Cybersecurity technology and practices are undergoing a sea change. While COVID-19 quarantines literally turned enterprise networks upside down overnight, a new wave of online attacks put enterprise data at risk. Today’s security operations center, once focused entirely on perimeter defenses, is now abuzz with new disciplines, including threat hunting and incident response. And yesterday’s security technologies are being remade with new capabilities, including artificial intelligence, automation, and orchestration.

How is your security organization keeping up with these rapid shifts in process and technology? Have you been briefed on the latest approaches to securing a widely-remote set of users and trading partners? Would you like to know more about evolving methods for automating cybersecurity processes, enabling the security team to do more work with fewer staff? Can AI and machine learning really help your team to detect and mitigate the new wave of sophisticated attacks?

Get the answers to these and many other emerging cybersecurity questions at Dark Reading’s first-quarter event: Cybersecurity’s Next Wave: What Every Enterprise Should Know. This free, all-day online conference, produced by the editors of Dark Reading, offers an online “crash course” on some of the latest tools and best practices for fighting the next generation of security threats. You’ll hear from top experts and practitioners on how to secure remote systems, even after the COVID-19 crisis has settled.

Among the topics that will be covered at Cybersecurity’s Next Wave: What Every Enterprise Should Know:

  • Strategies for improving security in remote and work-from-home systems
  • New methods for securing links to customers and suppliers working remotely
  • Emerging best practices and technologies for automating cybersecurity processes
  • Methods for linking and orchestrating existing systems to improve overall security
  • Tools and processes for collecting and filtering security data
  • Strategies for using AI and machine learning to improve threat detection
  • Advice and recommendations for penetration testing and threat hunting
  • Future directions of security technology – and how to prepare for them

If you want to get up the speed on the latest developments in cybersecurity tools and best practices – including methods for securing today’s widely-remote enterprise workforce -- then this virtual event is for you.


Research Report: The State of Endpoint Security

by Dark ReadingMar 05, 2021

It is often said that the end user is cybersecurity's weakest link. At no time has that axiom been more prominent than in 2020, when the COVID-19 pandemic turned millions of office employees into home workers.

As a new year begins, what are enterprises doing to strengthen end user security, and the systems and devices that support those end users? How are enterprises securing mobile devices and other end-user-owned systems? How are organizations changing the way they build security awareness, and the way end users protect themselves from phishing, social engineering, and other attacks on identity?

In this survey, we poll enterprise security professionals on how they are building their endpoint security defenses, including remote access, identity management, authentication, desktop security, mobile device management, wi-fi security, antivirus tools, phishing defenses, and security awareness training.

The information submitted is collected by both Informa Tech and our sponsor Thycotic Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Enterprises Are Developing Secure Applications

by Dark ReadingMar 03, 2021

One of the most common ways cybercriminals breach enterprises is by finding security vulnerabilities in the applications they use. The last year delivered a plethora of security challenges. Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices. Additionally, the increase in attacks by cybercriminals who took advantage of the expanded attack surface as a result of COVID-19 work-from-home mandates made it a trying time for cybersecurity teams.

Download Dark Reading's new report How Enterprises Are Developing Secure Applications to read about the challenges in adding security to the latest app development processes, such as DevOps and agile. The report also highlights how cybersecurity teams and app dev teams are working together, as well as what tools enterprises are using to identify potential vulnerabilities during application development or in already-deployed software.

The information submitted is collected by both Informa Tech and our sponsor Checkmarx. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Tech Insights: Detecting and Preventing Insider Data Leaks

by Dark ReadingMar 03, 2021

While malicious insiders often get the headlines, most enterprise data leaks are accidental — caused by end users who fail to follow corporate security policy or try to work around it. In this Tech Insight, experts discuss methods for detecting and preventing risky or anomalous end user behavior, as well as methods for preventing unauthorized access and transfer of data by end users. You'll also get insight on the evolution of technology used to prevent accidental data leaks, such as data leak protection (DLP) and alternatives.

Inside this report:

  • Detecting and Preventing Insider Data Leaks
  • Over-Sharer or Troublemaker? How to Identify Insider-Risk Personas
  • Dealing With Insider Threats in the Age of COVID
  • Modern Day Insider Threat:Network Bugs That Are Stealing Your Data

The information submitted is collected by both Informa Tech and our sponsor Code42. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Building the SOC of the Future

by Dark ReadingFeb 10, 2021

No matter what your industry, your organization's size, or the number of work-from-home staff you have, there is a growing need to monitor your systems for potential threats—and have the capacity to respond quickly in the event of a compromise. To build out this capacity, many enterprises are building or expanding their security operations centers (SOCs) to improve their ability to detect and respond to cyber threats. In this special report, experts offer insight and recommendations on how to build a next-generation SOC, and what tools and skills you may need to outfit that SOC to respond to today's most current threats and online exploits.

Inside this report:

  • Why and How to Understand Your Cyber Attackers
  • How Advanced Attackers Take Aim at Office 365
  • Criminals Turn to IM Platforms to Avoid Law Enforcement Scrutiny
  • Mobile Phishing Attacks Increase Sharply
  • Targeted Discovery: Why Attack Surface Management Isn't Enough

The information submitted is collected by both Informa Tech and our sponsor Infoblox. Click here to view our sponsor's privacy policy.

This report is sponsored by: