Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Webcast: Cyber Attackers’ Favorite Exploits – and How to Stop Them

by Dark ReadingNov 12, 2020

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Cyber Attackers’ Favorite Exploits – And How to Stop Them -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Among the topics that will be covered at Cyber Attackers’ Favorite Exploits: And How to Stop Them:

  • An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
  • A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
  • Insight on how malware is typically deployed, and how it works after it’s infected your systems
  • Details on some of the simplest and most common tricks for cracking enterprise systems and networks
  • Methods for recognizing and mitigating frequently-used online cyber exploits
  • Advice on how to use threat intelligence to prevent trending attacks
  • A look at emerging methods to frustrate and deceive online attackers
  • Recommendations on how to analyze information on emerging exploits, and how to develop a response plan

 

If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them -- then this virtual event is for you.


Webcast: Cyber Attackers’ Favorite Exploits – and How to Stop Them

by Dark ReadingNov 12, 2020

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Cyber Attackers’ Favorite Exploits – And How to Stop Them -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Among the topics that will be covered at Cyber Attackers’ Favorite Exploits: And How to Stop Them:

  • An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
  • A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
  • Insight on how malware is typically deployed, and how it works after it’s infected your systems
  • Details on some of the simplest and most common tricks for cracking enterprise systems and networks
  • Methods for recognizing and mitigating frequently-used online cyber exploits
  • Advice on how to use threat intelligence to prevent trending attacks
  • A look at emerging methods to frustrate and deceive online attackers
  • Recommendations on how to analyze information on emerging exploits, and how to develop a response plan

 

If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them -- then this virtual event is for you.


Webcast: Cyber Attackers’ Favorite Exploits – And How to Stop Them

by Dark ReadingNov 12, 2020

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Cyber Attackers’ Favorite Exploits – And How to Stop Them -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Among the topics that will be covered at Cyber Attackers’ Favorite Exploits: And How to Stop Them:

  • An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
  • A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
  • Insight on how malware is typically deployed, and how it works after it’s infected your systems
  • Details on some of the simplest and most common tricks for cracking enterprise systems and networks
  • Methods for recognizing and mitigating frequently-used online cyber exploits
  • Advice on how to use threat intelligence to prevent trending attacks
  • A look at emerging methods to frustrate and deceive online attackers
  • Recommendations on how to analyze information on emerging exploits, and how to develop a response plan

 

If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them -- then this virtual event is for you. Register today!


Research Report: The Malware Threat Landscape

by Dark ReadingNov 06, 2020

Cybercriminals continue to ramp up attacks against organizations in greater numbers than in the past. Phishing and viruses remain the most commonly detected attacks on enterprise networks. But ransomware and business email compromise (BEC) attacks appear poised to become the biggest threats over the next two years.

Download Dark Reading's 2020 Malware Threat Landscape Report to learn about the real makeup of online threats, as reported by the defenders who see them every day.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Data Breaches Affect the Enterprise (2020)

by Dark ReadingOct 29, 2020

Over the past 12 months, there's been more of everything on the data breach front — except good news. Additionally, thanks to COVID-19 and the sudden movement toward home workers, data breaches have become even more common in recent months. Download Dark Reading's report, How Data Breaches Affect the Enterprise, to uncover how enterprises are responding to damage from phishing, targeted campaigns, vulnerability exploits, and denial-of-service attacks. IT organizations have undergone radical changes necessitated by COVID-19, and most organizations expect to respond to a major data breach in the next 12 months. Interestingly, though, many companies express confidence in their ability to respond to these data breaches effectively.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: How to Measure and Reduce Cybersecurity Risk in Your Organization

by Dark ReadingOct 27, 2020

It's hard for organizations to manage cybersecurity risks before they can monitor and measure them. In this Tech Digest, we examine the difficult practice of measuring cyber-risk that has long been an elusive target for enterprises. Across the evolution of cyber-risk management, security metrics have at times been seen an arcane art, a hopeless pseudoscience, a series of educated guesses, and — in the best cases — a disciplined practice.

Here's what's inside:

  • How to Measure and Reduce Cybersecurity Risk in Your Organization
  • Security Through an Economics Lens: A Guide for CISOs
  • Less Than Half of Security Pros Can Identify Their Organization's Level of Risk
  • Cybersecurity Budgets Rose in 2019, Uncertainty Prevails in 2020
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policyWhiteHat SecurityExtraHopRemediantBlueVoyanteSentireQualysCBTSTrustwave

This digital issue is sponsored by:
Tech Digest Sponsor Logos


Whitepaper: Building an Effective Cybersecurity Incident Response Team

by Dark ReadingSep 28, 2020

Today's enterprises are under attack. Whether it's malware, ransomware, social engineering, or targeted exploits, security teams must be ready to detect these cyber attacks, analyze the threat, and launch a quick and effective response. Is your organization ready?

There are a wide variety of IT security tools available for cyber incident response. But most organizations have discovered that it's people — the analysts and technicians who make up the cyber response team — that provide the key knowledge needed to recognize the exploits and instigate critical actions in the event of a cybersecurity incident.

This informative report by Dark Reading offers insight on how to build and train a cyber incident response team. You'll learn:

• What to look for as you're staffing up, including the experience and certifications the team members should have
• How to keep your team members up to speed on the latest threats — from methods of training to threat intelligence sources to how to plan and rehearse incident response programs before an intrusion occurs
• Some of the critical "people and process" elements of incident response
• How to maximize the capabilities of your cyber incident response team

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How IT Security Organizations are Attacking the Cybersecurity Problem

by Dark ReadingSep 16, 2020

In 2019, enterprises encountered a wide range of new exploits and threats, as well as new challenges associated with online privacy issues and regulations. How will these organizations be investing their cybersecurity budgets and staffing in the next 12 months? What tools and best practices do they consider most important, and which emerging technologies are they implementing? This report, one of three to come out of Dark Reading's annual Strategic Security Survey, offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Special Report: Understanding Your Cyber Attackers

by Dark ReadingAug 19, 2020

To prepare an effective defense of your enterprise data, you need to know something about the types of attackers you're facing — and the methods they use. In this Dark Reading special report, you'll learn about the strategies you can employ to evaluate your enterprise's "attack surface" and the potential threats that affect organizations like yours.

In this comprehensive report, you'll get insight on how to evaluate your defenses through penetration and red-teaming, as well as advice and tips on how to use threat intelligence tools to help gauge the risk faced by your specific organization. You'll also get recommendations on how to implement threat hunting practices that can help you identify potential attackers and exploits before they hit your enterprise.

If you want to get a better sense of the threats that might be coming — and your organization's vulnerability to those threats — this special report is a must-read.

Inside this report:

  • Why and How to Understand Your Cyber Attackers
  • How Advanced Attackers Take Aim at Office 365
  • Criminals Turn to IM Platforms to Avoid Law Enforcement Scrutiny
  • Mobile Phishing Attacks Increase Sharply
  • Targeted Discovery: Why Attack Surface Management Isn't Enough

The information submitted is collected by both Informa Tech and our sponsor Randori. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: 2020 State of Cybersecurity Operations and Incident Response

by Dark ReadingAug 14, 2020

In recent years, enterprises have responded to a growing volume of sophisticated cyber-attacks by building security operations centers (SOCs) and incident response programs. Faced with this growing number of exploits, a shortage of trained workers, and the growing sophistication of online attackers, security operations teams were under enormous pressure at the outset of 2020.

In March, however, these challenges were compounded when the coronavirus pandemic focused most organizations to turn desktop-oriented IT environments into remote, work-from-home, and mobile environments

In this in-depth report, Dark Reading and Omdia Research present the results of a detailed survey of SOC staff, incident response teams, and other IT security professionals. This report provides unique data on the activities, attitudes, and concerns of security operations teams, including insights on what's working -- and what isn't -- in the SOC.

Download this report today from Dark Reading to get an inside look at how cybersecurity teams are coping with new cyber threats in today's environment.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by: