Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: Incident Readiness and Building Response Playbook

by Dark ReadingJul 14, 2021

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this special report, learn the Xs and Os of any good security incident readiness and response playbook.

What's Inside:

  • Developing an Incident Readiness and Response Playbook
  • How to Create an Incident Response Plan From the Ground Up
  • 10 Benefits of Running Cybersecurity Exercises
  • Despite Heightened Breach Fears, Incident Response Capabilities Lag
  • Motorola Solutions Perspective: Securing Mission-Critical Technology

  • Details
  • Research Report
  • 641 likes

Research Report: The State of Malware Threats

by Dark ReadingJun 09, 2021

The SolarWinds attack, disruptions caused by COVID-19, zero-day exploits, and emerging threats: It's been quite a year, and security teams have their work cut out for them when trying to stay a step ahead of malware-wielding criminals.


Research Report: The State of Cybersecurity Incident Response

by Dark ReadingMay 01, 2021

Every day, enterprises wrestle with cybersecurity compromises of all sizes and types, ranging from simple viruses to complex, targeted online attacks. And with the onset of COVID-19 in early 2020, a new wave of online attacks created more data breach concerns than ever before. To successfully defend their data, IT organizations are developing teams, tools, and processes to quickly respond to new cyber threats and compromises — but not all of them are succeeding.

Download Dark Reading's The State of Incident Response, sponsored by Unit 42 by Palo Alto Networks, to learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Whitepaper: Dark Reading Report: Battle for the Endpoint

by Dark ReadingApr 02, 2021

The idea that thousands of work-from-home employees using personal printers and home Wi-Fi might become the norm for some companies was unthinkable not long ago. But, for the IT security manager, the concept of "endpoint security" has evolved significantly. How is your enterprise approaching the endpoint security problem?


Research Report: The State of Endpoint Security

by Dark ReadingMar 05, 2021

It is often said that the end user is cybersecurity's weakest link. At no time has that axiom been more prominent than in 2020, when the COVID-19 pandemic turned millions of office employees into home workers.

As a new year begins, what are enterprises doing to strengthen end user security, and the systems and devices that support those end users? How are enterprises securing mobile devices and other end-user-owned systems? How are organizations changing the way they build security awareness, and the way end users protect themselves from phishing, social engineering, and other attacks on identity?

In this survey, we poll enterprise security professionals on how they are building their endpoint security defenses, including remote access, identity management, authentication, desktop security, mobile device management, wi-fi security, antivirus tools, phishing defenses, and security awareness training.


Research Report: How Enterprises Are Developing Secure Applications

by Dark ReadingMar 03, 2021

One of the most common ways cybercriminals breach enterprises is by finding security vulnerabilities in the applications they use. The last year delivered a plethora of security challenges. Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices. Additionally, the increase in attacks by cybercriminals who took advantage of the expanded attack surface as a result of COVID-19 work-from-home mandates made it a trying time for cybersecurity teams.

Download Dark Reading's new report How Enterprises Are Developing Secure Applications to read about the challenges in adding security to the latest app development processes, such as DevOps and agile. The report also highlights how cybersecurity teams and app dev teams are working together, as well as what tools enterprises are using to identify potential vulnerabilities during application development or in already-deployed software.


Research Report: Tech Insights: Detecting and Preventing Insider Data Leaks

by Dark ReadingMar 03, 2021

While malicious insiders often get the headlines, most enterprise data leaks are accidental — caused by end users who fail to follow corporate security policy or try to work around it. In this Tech Insight, experts discuss methods for detecting and preventing risky or anomalous end user behavior, as well as methods for preventing unauthorized access and transfer of data by end users. You'll also get insight on the evolution of technology used to prevent accidental data leaks, such as data leak protection (DLP) and alternatives.

Inside this report:

  • Detecting and Preventing Insider Data Leaks
  • Over-Sharer or Troublemaker? How to Identify Insider-Risk Personas
  • Dealing With Insider Threats in the Age of COVID
  • Modern Day Insider Threat:Network Bugs That Are Stealing Your Data


Research Report: Building the SOC of the Future

by Dark ReadingFeb 10, 2021

No matter what your industry, your organization's size, or the number of work-from-home staff you have, there is a growing need to monitor your systems for potential threats—and have the capacity to respond quickly in the event of a compromise. To build out this capacity, many enterprises are building or expanding their security operations centers (SOCs) to improve their ability to detect and respond to cyber threats. In this special report, experts offer insight and recommendations on how to build a next-generation SOC, and what tools and skills you may need to outfit that SOC to respond to today's most current threats and online exploits.

Inside this report:

  • Why and How to Understand Your Cyber Attackers
  • How Advanced Attackers Take Aim at Office 365
  • Criminals Turn to IM Platforms to Avoid Law Enforcement Scrutiny
  • Mobile Phishing Attacks Increase Sharply
  • Targeted Discovery: Why Attack Surface Management Isn't Enough

The information submitted is collected by both Informa Tech and our sponsor Infoblox. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The State of Threat Detection and Response

by Dark ReadingDec 14, 2020

Many organizations have invested in improving their threat detection capabilities over the past two years and express increased confidence in their ability to stop threats that have penetrated the network perimeter. However, these organizations also cite a number of weaknesses and areas for further improvement, including limited log visibility, limited threat visibility, and an over-reliance on manual processes.

In 2020, Dark Reading surveyed IT and cybersecurity professionals to understand the technologies and processes they are using to detect threats, identify exposure to specific exploits, and search for incursions in historic log data. This research, conducted on behalf of Anomali, was used for the basis of our report. Download "The State of Threat Detection and Response" to learn about the tools organizations use to assess their organization's threat detection capabilities and identify the limitations and challenges that might be hampering that ability.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: 2020: The Year in Security

by Dark ReadingDec 07, 2020

COVID-19 upended the security world in 2020. With employees moving to remote home offices, organizations were forced to enhance their endpoint security, while many were facing tighter budgets amid a pandemic-ailing economy. This new normal also emboldened cybercriminals to pivot their attacks to remote workers, targeting virtual private networks and collaboration platforms such as Zoom, and waves of coronavirus-related spam and phishing lures.

Download Dark Reading's Tech Digest 2020: The Year in Security for a look at the biggest security stories that — so far — have shaped a very strange and stressful year.

Here's what's inside:

  • Overview: 2020 - The Year in Security
  • As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints
  • Criminals Selling Video Conferencing Credentials on Dark Web
  • Maze Ransomware Operators Step Up Their Game
  • 'Ripple20' Bugs Plague Enterprise, Industrial & Medical IoT Devices
  • Microsoft Patches Wormable RCE Flaw in Windows DNS Servers
  • Plus a whole lot more!
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policyDomainToolsCBTS

This digital issue is sponsored by:

DomainTools Logo
CBTS Logo