Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Research Report: What Every Enterprise Should Know About Security Product Testing

by Dark ReadingMay 25, 2022

Selecting the right network security product for your organization can be a daunting decision. Dozens of security products all similarly promise to protect your environment without impeding network performance. How can you determine the best fit for your network? Where can you get nonbiased information on how these products will actually perform in your network?

The good news is that security product testing is evolving, with third party, open security testing organizations emerging to provide objective information on security products. In this special report, you will get insight on how product testing is evolving into a more open model, with more objective testing processes, parameters, and reports.

What's inside:

  • From the Desk of the Executive Director of NetSecOPEN
  • Impact of Neutral Agencies in Evolution of Security
  • NetSecOPEN Ushers in New Era in Cybersecurity Testing
  • Let's Get Real: Network Security and Performance Testing Needs to Be Open to Evolve
  • Piecing Together the Performance Testing Puzzle
  • NetSecOPEN Opens Up Security Test Standards
  • The Value of Independent Product Testing in Cybersecurity

The information submitted is collected by both Informa Tech and our sponsors.

This report is sponsored by: NetSecOPENKeysightSonicWallSpirentUNH-IOL • VIAVI Solutions


Research Report: Breaches Prompt Changes to Enterprise IR Plans and Processes

by Dark ReadingMay 11, 2022

Many organizations revised their incident response (IR) processes over the last year in response to high-profile breaches resulting from vulnerabilities in mission-critical software. Concerns over the breaches prompted a greater focus on automated tools and processes for detecting and responding to security incidents more effectively. However, many still emphasize attack prevention and perimeter defense over detection and response. Download Dark Reading's report to learn more about where today's cybersecurity pros stand on IR tools and processes.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: 6 Elements of a Solid IoT Security Strategy

by Dark ReadingMay 09, 2022

Shadow IT was difficult enough. The addition of Internet of Things to the enterprise network introduces even more issues because security teams can't inspect and manage the devices. Enterprise defenders need a sound IoT security strategy that addresses asset discovery and management, consistent security policies, and automation.

The report also looks at:

  • How attackers are targeting IoT
  • How BlackBerry is reinventing itself for IoT security
  • How 5G LANs are changing IoT landscape

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Incorporating a Prevention Mindset into Threat Detection and Response

by Dark ReadingMay 01, 2022

Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time.

The report covers areas enterprises should focus on:

  • What positive response looks like.
  • Improving security hygiene.
  • Combining preventive actions with red team efforts.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Practical Network Security Approaches for a Multicloud, Hybrid IT World

by Dark ReadingApr 13, 2022

Cloud computing — encompassing SaaS apps, modular development platforms, and on-demand IT infrastructure — is omnipresent in the enterprise. However, the road to digital transformation in a multicloud setting can be full of speed bumps.

The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy:

  • increase visibility over the environment
  • learning cloud-specific skills
  • relying on established security frameworks
  • re-architecting the network

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: State of the Cloud: A Security Perspective

by Dark ReadingMar 23, 2022

Cloud computing has evolved over the years from a nice-to-have item on the IT wish list to a core technology driving business initiatives. But despite widespread adoption, cloud-based IT systems continue to be saddled with issues related to data security, privacy, and resilience.

Download this report from Dark Reading for an in-depth look at what IT security teams are thinking and doing when it comes to the cloud.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal

by Dark ReadingMar 23, 2022

With attacks and breaches on the rise, enterprise security teams need full visibility over what they have in their network. DNS is a key tool for visibility and asset discovery. Proactive DNS-layer security — such as using DNS data to mitigate threats that network-based controls may miss — is about blocking threats before they compromise the enterprise.

What's Inside:

  • How to Work With DNS
  • Details of a DNS Name Server Hijack Attack
  • Six Common Mistakes in TCP/IP Stacks
  • About the DNS Ecosystem

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Enterprises Are Securing the Application Environment

by Dark ReadingMar 01, 2022

Many IT teams have maintained their focus on application security last year, despite the challenges associated with operating during the global COVID-19 pandemic. But few made significant progress in scaling up their efforts to secure apps across the entire cloud and on-premises environments. Download this report from Dark Reading to learn more about the measures enterprises have adopted to ensure the security of their internally developed applications and third-party packaged applications.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Rethinking Endpoint Security in a Pandemic and Beyond

by Dark ReadingMar 01, 2022

IT security teams are expending the concept of "endpoint security" as companies adjust to a distributed workforce. How much responsibility will enterprise IT take for the security of personal devices such as printers. How will they manage identities across multiple cloud services?

The report covers areas enterprises should focus on for their endpoint security strategy:

  • Managing identities and credentials
  • Vulnerability scanning and remediation
  • Quarantining at-risk endpoints
  • Reviewing suspect accounts

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World

by Dark ReadingFeb 16, 2022

It is often said that the end user is cybersecurity's weakest link. As enterprises emerge from COVID-19 still supporting an unprecedented number of remote workers, that axiom is more important than ever. Zero-trust network access and multifactor authentication have emerged as top focus areas to bolster endpoint security defenses.

Dark Reading's 2022 Endpoint Security Report examines how IT and cybersecurity professionals are grappling with the impact of pandemic-related changes on endpoint security strategies. The report explores how they are building their endpoint security defenses, and provides insight on what organizations are doing to protect users from malware, hackers, and social engineering attacks.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by: