Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: State of Enterprise Cybersecurity: Invest Now, or Pay Big Later

by Dark ReadingDec 21, 2022

Enterprise security teams find themselves stretched. There is pressure to speed up digital transformation initiatives, migrate to the cloud, and to ramp up the pace of software development and deployment. The growing demands on the business requires organizations to move to cloud software-, platform-, and infrastructure-as-a-service. The threats stacked against business-technology systems — such as ransomware, phishing, and data theft — are only going to continue to rise. This report reveals just how stretched organizations have grown when it comes to securing their business-technology systems from attack.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Enterprises Are Assessing Cyber-Risk

by Dark ReadingDec 08, 2022

A rapidly changing threat landscape has complicated efforts by enterprise IT and security teams to assess and manage cyber-risk over the last 12 months. Although concerns linger over the risk posed by the pandemic-driven shift to distributed and hybrid work environments, other issues dominated, including application security vulnerabilities, supply chain weaknesses, and cloud security. Download this new report from Dark Reading to read more about how enterprises are assessing cybersecurity risks.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Developing and Testing an Effective Breach Response Plan

by Dark ReadingNov 27, 2022

Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to:

  • understand the technical environment,
  • determine what types of incidents would trigger the plan,
  • know which stakeholders need to be notified and how to do so,
  • develop steps to contain the breach, collect evidence, and initiate recovery.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Enterprises Are Attacking the Cybersecurity Problem Report

by Dark ReadingOct 30, 2022

Data breaches and heightened worries over software supply chain threats and cloud vulnerabilities were major drivers of enterprise cybersecurity initiatives over the past year. Security decision-makers prioritized projects to reduce their organizations' exposure to attacks via these vectors even as they maintained a steady focus on mitigating phishing, malware, and other end-user threats. Download the latest report from Dark Reading: How Enterprises Are Attacking the Cybersecurity Problem to read more about cyber threats and challenges organizations face.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Creating an Effective Incident Response Plan

by Dark ReadingOct 29, 2022

Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical.

This issue of Tech Insights also includes:

  • a look at the newly signed cyber-incident law,
  • how organizations can apply behavioral psychology to incident response,
  • and an overview of the Open Cybersecurity Schema Framework.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Building the SOC of the Future

by Dark ReadingOct 03, 2022

While an attacker just needs to find one vulnerability to get in to the network, the defender has to look everywhere. Defenders have to identify, disrupt, and stop attacks in the short period of time between when an attacker gets in and causes damage. One way is a security operations center to get that "all the time" coverage.

What's Inside:

  • AI and cybersecurity response
  • Automation
  • Proctive threat hunting
  • Next-gen SIEM

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Report: Emerging Cyber Vulnerabilities That Every Enterprise Should Know About

by Dark ReadingSep 21, 2022

The number of security vulnerabilities discovered and reported during the past year has risen significantly, especially the ones rated critical. Attack volume is also on the rise. There is no way security teams can address every single one right away — prioritization is key.

Some of the vulnerabilities highlighted in the report include:

  • the long-term impact of Log4Shell
  • Return of Office macros
  • Exploiting Microsoft Exchange Server
  • Bugs in Atlassian Confluence

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Machine Learning, AI & Deep Learning Improve Cybersecurity

by Dark ReadingSep 12, 2022

Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers:

  • How to assess the vendor's AI/ML claims
  • Defining success crieria for AI/ML implementations
  • Challenges when implementing AI

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The State of Supply Chain Threats

by Dark ReadingAug 22, 2022

Supply chain risks is top of mind for cybersecurity teams. Many organizations have started making significant changes to their supply chain security practices over the past year to address growing risks from vulnerable third-party software and open source components.

Dark Reading's "The State of Supply Chain Threats" report shows a high percentage of organizations have implemented processes for mitigating risk from vulnerabilities in the software supply chain, whether it's having a dedicated team to respond to supply chain issues, checking container images for security flaws, or using only software components from trusted entities. Download the informative report to learn more about how security teams are mitigating supply chain risks.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Ransomware Resilience and Response: The Next-Generation

by Dark ReadingAug 18, 2022

When ransomware locks up your critical data and essential systems, you don't have time to panic. It is time to act — and this report has the details on what should be inside your ransomware response playbook.

  • Making a list of who to notify
  • How to defend the environment
  • Deciding which incidents trigger which actions.

This report also provides advice on how security teams should make their organizations more resilient, have the proper technologies in place, and begin the hard discussions before the attack hits.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by: