Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Webcast: Cyber Threats, Cyber Vulnerabilities: Assessing Your Attack Surface

by Dark ReadingNov 17, 2021

Every enterprise today knows that cyber attacks pose a significant threat to their business. But do you know exactly how much risk you face? Do you know where your greatest vulnerabilities are? Do you know which attacks are most likely to be used against an organization like yours, and which attackers are most likely to target you?

These are just some of the questions that will be explored and answered at Dark Reading’s next virtual event, Cyber Threats, Cyber Vulnerabilities: Assessing Your Attack Surface. This new virtual event -- a free, all-day online conference produced by the editors of Dark Reading -- offers insight, advice, and best practices on how to assess your organization’s “attack surface” – the parts that are most vulnerable to cybercriminals – and the risk you face in todays’ cyber threat environment. You’ll get a look at the various methods for finding and fixing cyber vulnerabilities in your organization, as well as an overview of some of the latest exploits and methods used by today’s cybercriminals. Top security experts and researchers will discuss the various ways that current threat actors might use to penetrate your defenses, and how you can identify IT conditions that might make your data vulnerable to those attacks. Best of all, you’ll get advice and recommendations on how to assess your organization’s overall cyber risk, and what you can do to reduce it.

 


Research Report: Zero Trust in Real Life

by Dark ReadingNov 02, 2021

With a growing number of attacks targeting credentials and identity technology, organizations are increasingly looking at the zero-trust security model to protect their network, employees, and data. Despite the buzz around zero-trust, many organizations are still in the early stages of deployments and figuring out how to get the most out of this security architecture. Zero-trust is not a set-and-forget security strategy. In this special report, learn how to think about redundancy and layered defense while transitioning to a zero-trust security model.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Data Breaches Affect the Enterprise

by Dark ReadingNov 01, 2021

Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Enterprises are Attacking the Cybersecurity Problem

by Dark ReadingOct 06, 2021

Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:

  • Details
  • Research Report
  • 268 likes

Research Report: 10 Hot Talks From Black Hat USA 2021

by Dark ReadingSep 29, 2021

Enterprise defenders keep tabs on a dizzying array of new vulnerabilities, threats, and security tools throughout the year to ensure their security roadmap is up-to-date. They have to adjust their strategic priorities to reflect the fact that black-hat attackers and white-hat researchers are continuously developing exploits and innovative attack techniques. This report highlights 10 of the hottest talks at this summer's Black Hat USA conference as well as recent developments in DNS security.

What's Inside:

  • 10 Hot Talks From Black Hat USA 2021
  • Researchers Learn From Nation-State Attackers' OpSec Mistake
  • The Danger of Action Bias: Is It Always Better to Act Quickly?
  • New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies
  • ESENTIRE PERSPECTIVES: Stop Chasing Maturity Models & Use a Risk-Based Approach

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: 6 Threats Enterprises Should Care About

by Dark ReadingSep 16, 2021

Every day, black-hat attackers and white-hat researchers uncover new security vulnerabilities in widely used systems and applications such as Active Directory and printer software. Enterprise defenders need to be aware of the newest — and potentially most impactful — vulnerabilities in order to detect attacks targeting them. In this Tech Insights, top researchers and experts discuss emerging vulnerabilities and countermeasures to prevent them from being exploited in their organization's systems.

What's Inside:

  • 6 Threats Enterprises Should Care About
  • Researchers Create New Approach to Detect Brand Impersonation
  • New Framework Aims to Describe & Address Complex Social Engineering Attacks
  • Security 101: The 'PrintNightmare' Flaw

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Enterprise Cybersecurity Plans in a Post-Pandemic World

by Dark ReadingAug 09, 2021

As the COVID-19 pandemic eases, IT security threats and the challenges involved in responding to them are trending upward. Security leaders expect that cyberattacks like ransomware, phishing, and malware will increase even as the pandemic eventually recedes.

Download the Dark Reading and Omdia Research Report Enterprise Cybersecurity Plans in a Post-Pandemic World to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Incident Readiness and Building Response Playbook

by Dark ReadingJul 14, 2021

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this special report, learn the Xs and Os of any good security incident readiness and response playbook.

What's Inside:

  • Developing an Incident Readiness and Response Playbook
  • How to Create an Incident Response Plan From the Ground Up
  • 10 Benefits of Running Cybersecurity Exercises
  • Despite Heightened Breach Fears, Incident Response Capabilities Lag
  • Motorola Solutions Perspective: Securing Mission-Critical Technology

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:

  • Details
  • Research Report
  • 641 likes

Webcast: Finding and Stopping Enterprise Data Breaches

by Dark ReadingJun 24, 2021

It’s the nightmare of every cybersecurity professional. Not only have cybercriminals breached your enterprise’s IT defenses and compromised critical data, but it wasn’t your team that discovered the compromise. Not only did you fail to keep the attacker out – you failed to detect the breach when it happened.

A new virtual event is designed to help you prevent that nightmare from happening to you. Finding and Stopping Enterprise Data Breaches -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the latest and most effective methods for detecting threats and compromises, as well as the key steps you should take to mitigate them. You’ll get a look at the next wave of threat detection tools and practices, as well as expert advice and recommendations on how to respond to a data breach. Top security experts and researchers will discuss ways to discover sophisticated and targeted exploits, even when they are well obfuscated. Best of all, you’ll get insight on what to do when you’ve discovered those compromises, including how to limit their impact and when to contact law enforcement.

Among the topics that will be covered at Finding and Stopping Enterprise Data Breaches:

  • A look at some of the latest tools and practices for detecting a compromise, including EDR and xDR
  • Insight on how your organization can use next-generation technologies such as AI and machine learning to uncover sophisticated attacks
  • Methods for analyzing system logs and threat intelligence to help detect hidden attacks
  • Critical actions to take when you suspect your data has been compromised
  • Key steps to mitigate a compromise and limit its impact
  • Building blocks of an effective incident response plan
  • How to staff and train your cybersecurity analysts and first responders

If you want to get up to date on the latest tools and practices for detecting cyber attacks – and limit their impact -- then this virtual event is for you.


Research Report: The State of Malware Threats

by Dark ReadingJun 09, 2021

The SolarWinds attack, disruptions caused by COVID-19, zero-day exploits, and emerging threats: It's been quite a year, and security teams have their work cut out for them when trying to stay a step ahead of malware-wielding criminals.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by: