Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: 6 Threats Enterprises Should Care About

by Dark ReadingSep 16, 2021

Every day, black-hat attackers and white-hat researchers uncover new security vulnerabilities in widely used systems and applications such as Active Directory and printer software. Enterprise defenders need to be aware of the newest — and potentially most impactful — vulnerabilities in order to detect attacks targeting them. In this Tech Insights, top researchers and experts discuss emerging vulnerabilities and countermeasures to prevent them from being exploited in their organization's systems.

What's Inside:

  • 6 Threats Enterprises Should Care About
  • Researchers Create New Approach to Detect Brand Impersonation
  • New Framework Aims to Describe & Address Complex Social Engineering Attacks
  • Security 101: The 'PrintNightmare' Flaw

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Webcast: Test TItle

by Dark ReadingSep 15, 2021

test


Research Report: Enterprise Cybersecurity Plans in a Post-Pandemic World

by Dark ReadingAug 09, 2021

As the COVID-19 pandemic eases, IT security threats and the challenges involved in responding to them are trending upward. Security leaders expect that cyberattacks like ransomware, phishing, and malware will increase even as the pandemic eventually recedes.

Download the Dark Reading and Omdia Research Report Enterprise Cybersecurity Plans in a Post-Pandemic World to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Incident Readiness and Building Response Playbook

by Dark ReadingJul 14, 2021

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this special report, learn the Xs and Os of any good security incident readiness and response playbook.

What's Inside:

  • Developing an Incident Readiness and Response Playbook
  • How to Create an Incident Response Plan From the Ground Up
  • 10 Benefits of Running Cybersecurity Exercises
  • Despite Heightened Breach Fears, Incident Response Capabilities Lag
  • Motorola Solutions Perspective: Securing Mission-Critical Technology

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Webcast: Finding and Stopping Enterprise Data Breaches

by Dark ReadingJun 24, 2021

It’s the nightmare of every cybersecurity professional. Not only have cybercriminals breached your enterprise’s IT defenses and compromised critical data, but it wasn’t your team that discovered the compromise. Not only did you fail to keep the attacker out – you failed to detect the breach when it happened.

A new virtual event is designed to help you prevent that nightmare from happening to you. Finding and Stopping Enterprise Data Breaches -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the latest and most effective methods for detecting threats and compromises, as well as the key steps you should take to mitigate them. You’ll get a look at the next wave of threat detection tools and practices, as well as expert advice and recommendations on how to respond to a data breach. Top security experts and researchers will discuss ways to discover sophisticated and targeted exploits, even when they are well obfuscated. Best of all, you’ll get insight on what to do when you’ve discovered those compromises, including how to limit their impact and when to contact law enforcement.

Among the topics that will be covered at Finding and Stopping Enterprise Data Breaches:

  • A look at some of the latest tools and practices for detecting a compromise, including EDR and xDR
  • Insight on how your organization can use next-generation technologies such as AI and machine learning to uncover sophisticated attacks
  • Methods for analyzing system logs and threat intelligence to help detect hidden attacks
  • Critical actions to take when you suspect your data has been compromised
  • Key steps to mitigate a compromise and limit its impact
  • Building blocks of an effective incident response plan
  • How to staff and train your cybersecurity analysts and first responders

If you want to get up to date on the latest tools and practices for detecting cyber attacks – and limit their impact -- then this virtual event is for you.


Research Report: The State of Malware Threats

by Dark ReadingJun 09, 2021

The SolarWinds attack, disruptions caused by COVID-19, zero-day exploits, and emerging threats: It's been quite a year, and security teams have their work cut out for them when trying to stay a step ahead of malware-wielding criminals.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The State of Cybersecurity Incident Response

by Dark ReadingMay 01, 2021

Every day, enterprises wrestle with cybersecurity compromises of all sizes and types, ranging from simple viruses to complex, targeted online attacks. And with the onset of COVID-19 in early 2020, a new wave of online attacks created more data breach concerns than ever before. To successfully defend their data, IT organizations are developing teams, tools, and processes to quickly respond to new cyber threats and compromises — but not all of them are succeeding.

Download Dark Reading's The State of Incident Response, sponsored by Unit 42 by Palo Alto Networks, to learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Whitepaper: Dark Reading Report: Battle for the Endpoint

by Dark ReadingApr 02, 2021

The idea that thousands of work-from-home employees using personal printers and home Wi-Fi might become the norm for some companies was unthinkable not long ago. But, for the IT security manager, the concept of "endpoint security" has evolved significantly. How is your enterprise approaching the endpoint security problem?

In this Tech Insights report by Dark Reading, and sponsored by Palo Alto Networks, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user might employ. You'll also get insight on how to develop a consistent endpoint security strategy that works for all of your end users, no matter what their roles or applications.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The State of Endpoint Security

by Dark ReadingMar 05, 2021

It is often said that the end user is cybersecurity's weakest link. At no time has that axiom been more prominent than in 2020, when the COVID-19 pandemic turned millions of office employees into home workers.

As a new year begins, what are enterprises doing to strengthen end user security, and the systems and devices that support those end users? How are enterprises securing mobile devices and other end-user-owned systems? How are organizations changing the way they build security awareness, and the way end users protect themselves from phishing, social engineering, and other attacks on identity?

In this survey, we poll enterprise security professionals on how they are building their endpoint security defenses, including remote access, identity management, authentication, desktop security, mobile device management, wi-fi security, antivirus tools, phishing defenses, and security awareness training.


Research Report: How Enterprises Are Developing Secure Applications

by Dark ReadingMar 03, 2021

One of the most common ways cybercriminals breach enterprises is by finding security vulnerabilities in the applications they use. The last year delivered a plethora of security challenges. Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices. Additionally, the increase in attacks by cybercriminals who took advantage of the expanded attack surface as a result of COVID-19 work-from-home mandates made it a trying time for cybersecurity teams.

Download Dark Reading's new report How Enterprises Are Developing Secure Applications to read about the challenges in adding security to the latest app development processes, such as DevOps and agile. The report also highlights how cybersecurity teams and app dev teams are working together, as well as what tools enterprises are using to identify potential vulnerabilities during application development or in already-deployed software.