Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: Ransomware Resilience and Response: The Next-Generation

by Dark ReadingAug 18, 2022

When ransomware locks up your critical data and essential systems, you don't have time to panic. It is time to act — and this report has the details on what should be inside your ransomware response playbook.

  • Making a list of who to notify
  • How to defend the environment
  • Deciding which incidents trigger which actions.

This report also provides advice on how security teams should make their organizations more resilient, have the proper technologies in place, and begin the hard discussions before the attack hits.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Report: Building and Maintaining an Effective Remote Access Strategy

by Dark ReadingAug 08, 2022

While organizations have been supporting work-from-home employees long before the COVID-19 pandemic lockdowns, the abrupt shift to everyone working from home still stressed enterprise architectures. Security teams deployed new controls and relaxed some policies so that people could keep working. As enterprises modernize their security architecture to accommodate the permanently remote employees, they are exploring zero trust, secure access service edge, new BYOD policies, and endpoint controls.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Living on the Edge: Building and Maintaining Security at the Network Edge

by Dark ReadingJul 25, 2022

Edge computing, which is simply computer power, applications, and storage shifted closer to the sources of data, promises to speed on-site decision-making and enable digital transformation. It also dramatically increases the attack surface. Edge computing is still new enough that security teams have to figure out for themselves how to secure it.

This report covers:

  • Assessing the attack surface
  • Monitoring data, devices, applications, and networks
  • Extend other security aspects to the edge

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Implementing Zero Trust In Your Enterprise: How to Get Started

by Dark ReadingJun 20, 2022

Security leaders need to provide adaptive trust and conditional access based on identity, operational and threat context, and risk appetite. Translating the zero-trust vision to implemented reality requires MFA, centralized identity, software-defined security, and analytics, to name a few.

What's Inside:

  • Navigating the zero-trust journey
  • Explanation of the OMB zero-trust deadlines
  • How zero-trust feeds into SASE
  • Understanding modern privileged access management

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Improving Enterprise Cybersecurity With XDR

by Dark ReadingJun 01, 2022

Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The State of Malware Threats

by Dark ReadingJun 01, 2022

Threat actors ramped up malware attacks over the past 12 months to try and take advantage of gaps in enterprise security caused by accelerated use of cloud services and remote work models. The attacks left many IT and cybersecurity leaders feeling insecure about their organization's security posture. Download this report from Dark Reading to find out how cybersecurity teams are they are dealing with malware-related challenges.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: What Every Enterprise Should Know About Security Product Testing

by Dark ReadingMay 25, 2022

Selecting the right network security product for your organization can be a daunting decision. Dozens of security products all similarly promise to protect your environment without impeding network performance. How can you determine the best fit for your network? Where can you get nonbiased information on how these products will actually perform in your network?

The good news is that security product testing is evolving, with third party, open security testing organizations emerging to provide objective information on security products. In this special report, you will get insight on how product testing is evolving into a more open model, with more objective testing processes, parameters, and reports.

What's inside:

  • From the Desk of the Executive Director of NetSecOPEN
  • Impact of Neutral Agencies in Evolution of Security
  • NetSecOPEN Ushers in New Era in Cybersecurity Testing
  • Let's Get Real: Network Security and Performance Testing Needs to Be Open to Evolve
  • Piecing Together the Performance Testing Puzzle
  • NetSecOPEN Opens Up Security Test Standards
  • The Value of Independent Product Testing in Cybersecurity

The information submitted is collected by both Informa Tech and our sponsors.

This report is sponsored by: NetSecOPENKeysightSonicWallSpirentUNH-IOL • VIAVI Solutions


Research Report: Breaches Prompt Changes to Enterprise IR Plans and Processes

by Dark ReadingMay 11, 2022

Many organizations revised their incident response (IR) processes over the last year in response to high-profile breaches resulting from vulnerabilities in mission-critical software. Concerns over the breaches prompted a greater focus on automated tools and processes for detecting and responding to security incidents more effectively. However, many still emphasize attack prevention and perimeter defense over detection and response. Download Dark Reading's report to learn more about where today's cybersecurity pros stand on IR tools and processes.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: 6 Elements of a Solid IoT Security Strategy

by Dark ReadingMay 09, 2022

Shadow IT was difficult enough. The addition of Internet of Things to the enterprise network introduces even more issues because security teams can't inspect and manage the devices. Enterprise defenders need a sound IoT security strategy that addresses asset discovery and management, consistent security policies, and automation.

The report also looks at:

  • How attackers are targeting IoT
  • How BlackBerry is reinventing itself for IoT security
  • How 5G LANs are changing IoT landscape

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Incorporating a Prevention Mindset into Threat Detection and Response

by Dark ReadingMay 01, 2022

Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time.

The report covers areas enterprises should focus on:

  • What positive response looks like.
  • Improving security hygiene.
  • Combining preventive actions with red team efforts.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by: