Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website:

Latest Content From Dark Reading

Presentation: [Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy

by Dark ReadingApr 27, 2018

We pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization's security. Find out what they are here.

Presentation: [Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge

by Dark ReadingApr 26, 2018

Now that we've got a couple of months from this year in the rearview mirror, security researchers have had enough time to crunch the numbers from 2017. That means a raft of new reports analyzing last year's cybersecurity data with updated telemetry on the threat landscape, economic impact, and defense problems facing the cybersecurity industry. Here are some of the most illuminating highlights.

Presentation: [Slideshow] 7 Steps to a Smooth, Secure Cloud Transition

by Dark ReadingApr 27, 2018

If you're thinking with a cloud-first mindset, you should be making sure all the right boxes are checked before you make the leap. Here, security experts highlight the most important steps to keep in mind while moving to the cloud. Find out what they had to say.

Research Report: [Strategic Security Report] Assessing Cybersecurity Risk

by Dark ReadingJun 30, 2017

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, delivers insight on how today's enterprises evaluate the risks they face. In addition to providing survey data on the implementation of risk metrics and best practices, this report offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things. The report also provides data on how organizations use threat intelligence, and how they factor that intelligence into their risk model.

Whitepaper: [Strategic Security Report] Cloud Security's Changing Landscape

by Dark ReadingNov 01, 2017

The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The survey will reveal how quickly cloud services and applications are expanding, the tools and services that organizations are employing to protect them, and enterprise plans for deploying next-generation cloud security technologies such as encryption, identity management, and cloud access security brokers.

Research Report: [Strategic Security Report] How Enterprises Are Attacking the IT Security Problem

by Dark ReadingJun 26, 2017

In 2016, enterprises encountered a range of new exploits and threats -- including ransomware and state-sponsored attacks -- and developed new plans of defense. How will these organizations be investing their cybersecurity budgets and staffing in the next 12 months? What tools and best practices do they consider most important, and which emerging technologies are they implementing? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources.

Research Report: [Strategic Security Report] Navigating the Threat Intelligence Maze

by Dark ReadingDec 15, 2017

Over the past few years, enterprises have gained access to vast new resources of information about cybersecurity threats. New services that collect information about external threats are being combined with existing technologies for analyzing security events. Enterprises are better able to assess potential threats by correlating data from multiple sources to measure risk and prioritize defenses. How are organizations harnessing these new information resources? In this survey, IT security professionals offer insight on how they are collecting, analyzing, and using threat intelligence to root out sophisticated threats and improve their overall defenses.

Digital Editorial Content: 10 Best Practices That Could Reshape Your IT Security Department

by Dark ReadingNov 06, 2018

This is Dark Reading's November Tech Digest, explores ten best practices that could reshape IT security departments.


  • 10 Best Practices That Could Reshape Your IT Security Department
  • Managing Data the Way We Manage Money
  • The Cloud Security Conundrum: Assets vs. Infrastructure
  • Think Like an Attacker: How a Red Team Operates

Digital Editorial Content: 10 Emerging Threats Every Enterprise Should Know About

by Dark ReadingAug 13, 2018

This Dark Reading's August Tech Digest explores ten emerging security threats to enterprise data.


  • 10 Emerging Threats Every Enterprise Should Know About
  • Trading Platforms Riddled with Severe Flaws
  • Cracking Cortana: The Dangers of Flawed Voice Assistants
  • Demystifying Mental Health in the Infosec Community
  • New Hack Weaponizes the Web Cache

Research Report: 10 Hot Talks From Black Hat USA 2021

by Dark ReadingSep 29, 2021

Enterprise defenders keep tabs on a dizzying array of new vulnerabilities, threats, and security tools throughout the year to ensure their security roadmap is up-to-date. They have to adjust their strategic priorities to reflect the fact that black-hat attackers and white-hat researchers are continuously developing exploits and innovative attack techniques. This report highlights 10 of the hottest talks at this summer's Black Hat USA conference as well as recent developments in DNS security.

What's Inside:

  • 10 Hot Talks From Black Hat USA 2021
  • Researchers Learn From Nation-State Attackers' OpSec Mistake
  • The Danger of Action Bias: Is It Always Better to Act Quickly?
  • New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies
  • Stop Chasing Maturity Models & Use a Risk-Based Approach