Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: Zero Trust in Real Life

by Dark ReadingNov 02, 2021

With a growing number of attacks targeting credentials and identity technology, organizations are increasingly looking at the zero-trust security model to protect their network, employees, and data. Despite the buzz around zero-trust, many organizations are still in the early stages of deployments and figuring out how to get the most out of this security architecture. Zero-trust is not a set-and-forget security strategy. In this special report, learn how to think about redundancy and layered defense while transitioning to a zero-trust security model.


Research Report: What Every Enterprise Should Know About Security Product Testing

by Dark ReadingMay 25, 2022

Selecting the right network security product for your organization can be a daunting decision. Dozens of security products all similarly promise to protect your environment without impeding network performance. How can you determine the best fit for your network? Where can you get nonbiased information on how these products will actually perform in your network?

The good news is that security product testing is evolving, with third party, open security testing organizations emerging to provide objective information on security products. In this special report, you will get insight on how product testing is evolving into a more open model, with more objective testing processes, parameters, and reports.

What's inside:

  • From the Desk of the Executive Director of NetSecOPEN
  • Impact of Neutral Agencies in Evolution of Security
  • NetSecOPEN Ushers in New Era in Cybersecurity Testing
  • Let's Get Real: Network Security and Performance Testing Needs to Be Open to Evolve
  • Piecing Together the Performance Testing Puzzle
  • NetSecOPEN Opens Up Security Test Standards
  • The Value of Independent Product Testing in Cybersecurity

The information submitted is collected by both Informa Tech and our sponsors.

This report is sponsored by: NetSecOPENKeysightSonicWallSpirentUNH-IOL • VIAVI Solutions


Research Report: Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal

by Dark ReadingMar 23, 2022

With attacks and breaches on the rise, enterprise security teams need full visibility over what they have in their network. DNS is a key tool for visibility and asset discovery. Proactive DNS-layer security — such as using DNS data to mitigate threats that network-based controls may miss — is about blocking threats before they compromise the enterprise.

What's Inside:

  • How to Work With DNS
  • Details of a DNS Name Server Hijack Attack
  • Six Common Mistakes in TCP/IP Stacks
  • About the DNS Ecosystem


Digital Editorial Content: The Year in Security: 2019

by Dark ReadingDec 10, 2019

A look at the biggest news stories (so far) of 2019. This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse.

Here's what's inside:

  • The Year in Security: 2019
  • VPN Vulnerabilities Point Out Need for Comprehensive Remote Security
  • Baltimore Ransomware Attack Takes Strange Twist
  • Citrix Breach Underscores Password Perils
  • Boeing 787 On-Board Network Vulnerable to Remote Hacking, Researcher Says
  • Plus a whole lot more...
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policy.
SpirionLookingGlass Cyber

This digital issue is sponsored by:
Spirion LookingGlass Cyber


Digital Editorial Content: The Year in Security 2018

by Dark ReadingDec 07, 2018

This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.

IN THIS REPORT:

  • Meltdown, Spectre Likely Just Scratch the Surface of Microprocessor Vulnerabilities
  • Cyberattack Aimed to Disrupt Opening of Winter Olympics
  • Fileless Attacks Jump 94% in First Half of 2018
  • Destructive 'VPNFilter' Attack Network Uncovered
  • Schneider Electric: TRITON/TRISIS Attack Used Zero-Day Flaw in its Safety Controller System, and a RAT
  • Memcached Servers Being Exploited in Huge DDoS Attacks
  • Hacker Unlocks 'God Mode' and Shares the 'Key'
  • 2018 on Track to Be One of the Worst Ever for Data Breaches


Research Report: The Threat from the Internet—and What Your Organization Can Do About It

by Dark ReadingJun 19, 2020

For most enterprises, the increasing use of the Internet has created new business opportunities, greater efficiencies, and a greenfield for innovation. However, online attackers have launched a wide range of Internet-borne attacks, ranging from DDoS to cloud data leaks to infiltration of e-commerce sites. And with the world relying more heavily on Web-based communication during the COVID-19 pandemic, new threats are emerging. This report by Dark Reading and sponsored by CyCognito, describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business.

This report will cover:
• How cyberattackers are adapting their own techniques to more effectively compromise businesses using work-from-home models
• How to defend against attackers that abuse cloud services, Web APIs and agile development
• What security questions you should ask to companies that provide your e-commerce, content management, collaboration, hosting, cloud storage and other online services
• Why it is essential for businesses to identify the blind spots in their computing environment

  • Details
  • Research Report
  • 294 likes

Research Report: The State of Threat Detection and Response

by Dark ReadingDec 14, 2020

Many organizations have invested in improving their threat detection capabilities over the past two years and express increased confidence in their ability to stop threats that have penetrated the network perimeter. However, these organizations also cite a number of weaknesses and areas for further improvement, including limited log visibility, limited threat visibility, and an over-reliance on manual processes.

In 2020, Dark Reading surveyed IT and cybersecurity professionals to understand the technologies and processes they are using to detect threats, identify exposure to specific exploits, and search for incursions in historic log data. This research, conducted on behalf of Anomali, was used for the basis of our report. Download "The State of Threat Detection and Response" to learn about the tools organizations use to assess their organization's threat detection capabilities and identify the limitations and challenges that might be hampering that ability.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The State of Supply Chain Threats

by Dark ReadingAug 22, 2022

Supply chain risks is top of mind for cybersecurity teams. Many organizations have started making significant changes to their supply chain security practices over the past year to address growing risks from vulnerable third-party software and open source components.

Dark Reading's "The State of Supply Chain Threats" report shows a high percentage of organizations have implemented processes for mitigating risk from vulnerabilities in the software supply chain, whether it's having a dedicated team to respond to supply chain issues, checking container images for security flaws, or using only software components from trusted entities. Download the informative report to learn more about how security teams are mitigating supply chain risks.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The State of Ransomware

by Dark ReadingOct 03, 2017

Ransomware is hitting enterprises at an alarming rate. Is your organization prepared? Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. Now well beyond the incipient stage of opportunistic attacks, this automated form of blackmail has increased in prevalence and sophistication. The malware now targets organizations of all sizes as the bad guys look for ways to extort money and create trouble for businesses by taking their data hostage. This new report from Dark Reading queried 220 IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges.


Research Report: The State of Malware Threats 2021

by Dark ReadingJun 09, 2021

The SolarWinds attack, disruptions caused by COVID-19, zero-day exploits, and emerging threats: It's been quite a year, and security teams have their work cut out for them when trying to stay a step ahead of malware-wielding criminals.