Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Whitepaper: Dark Reading Report: Battle for the Endpoint

by Dark ReadingApr 02, 2021

The idea that thousands of work-from-home employees using personal printers and home Wi-Fi might become the norm for some companies was unthinkable not long ago. But, for the IT security manager, the concept of "endpoint security" has evolved significantly. How is your enterprise approaching the endpoint security problem?

In this Tech Insights report by Dark Reading, and sponsored by Palo Alto Networks, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user might employ. You'll also get insight on how to develop a consistent endpoint security strategy that works for all of your end users, no matter what their roles or applications.

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Webcast: Cybersecurity’s Next Wave: What Every Enterprise Should Know

by Dark ReadingMar 25, 2021

Cybersecurity technology and practices are undergoing a sea change. While COVID-19 quarantines literally turned enterprise networks upside down overnight, a new wave of online attacks put enterprise data at risk. Today’s security operations center, once focused entirely on perimeter defenses, is now abuzz with new disciplines, including threat hunting and incident response. And yesterday’s security technologies are being remade with new capabilities, including artificial intelligence, automation, and orchestration.

How is your security organization keeping up with these rapid shifts in process and technology? Have you been briefed on the latest approaches to securing a widely-remote set of users and trading partners? Would you like to know more about evolving methods for automating cybersecurity processes, enabling the security team to do more work with fewer staff? Can AI and machine learning really help your team to detect and mitigate the new wave of sophisticated attacks?

Get the answers to these and many other emerging cybersecurity questions at Dark Reading’s first-quarter event: Cybersecurity’s Next Wave: What Every Enterprise Should Know. This free, all-day online conference, produced by the editors of Dark Reading, offers an online “crash course” on some of the latest tools and best practices for fighting the next generation of security threats. You’ll hear from top experts and practitioners on how to secure remote systems, even after the COVID-19 crisis has settled.

Among the topics that will be covered at Cybersecurity’s Next Wave: What Every Enterprise Should Know:

  • Strategies for improving security in remote and work-from-home systems
  • New methods for securing links to customers and suppliers working remotely
  • Emerging best practices and technologies for automating cybersecurity processes
  • Methods for linking and orchestrating existing systems to improve overall security
  • Tools and processes for collecting and filtering security data
  • Strategies for using AI and machine learning to improve threat detection
  • Advice and recommendations for penetration testing and threat hunting
  • Future directions of security technology – and how to prepare for them

If you want to get up the speed on the latest developments in cybersecurity tools and best practices – including methods for securing today’s widely-remote enterprise workforce -- then this virtual event is for you.


Research Report: The State of Endpoint Security

by Dark ReadingMar 05, 2021

It is often said that the end user is cybersecurity's weakest link. At no time has that axiom been more prominent than in 2020, when the COVID-19 pandemic turned millions of office employees into home workers.

As a new year begins, what are enterprises doing to strengthen end user security, and the systems and devices that support those end users? How are enterprises securing mobile devices and other end-user-owned systems? How are organizations changing the way they build security awareness, and the way end users protect themselves from phishing, social engineering, and other attacks on identity?

In this survey, we poll enterprise security professionals on how they are building their endpoint security defenses, including remote access, identity management, authentication, desktop security, mobile device management, wi-fi security, antivirus tools, phishing defenses, and security awareness training.

The information submitted is collected by both Informa Tech and our sponsor Thycotic Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: How Enterprises Are Developing Secure Applications

by Dark ReadingMar 03, 2021

One of the most common ways cybercriminals breach enterprises is by finding security vulnerabilities in the applications they use. The last year delivered a plethora of security challenges. Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices. Additionally, the increase in attacks by cybercriminals who took advantage of the expanded attack surface as a result of COVID-19 work-from-home mandates made it a trying time for cybersecurity teams.

Download Dark Reading's new report How Enterprises Are Developing Secure Applications to read about the challenges in adding security to the latest app development processes, such as DevOps and agile. The report also highlights how cybersecurity teams and app dev teams are working together, as well as what tools enterprises are using to identify potential vulnerabilities during application development or in already-deployed software.

The information submitted is collected by both Informa Tech and our sponsor Checkmarx. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Tech Insights: Detecting and Preventing Insider Data Leaks

by Dark ReadingMar 03, 2021

While malicious insiders often get the headlines, most enterprise data leaks are accidental — caused by end users who fail to follow corporate security policy or try to work around it. In this Tech Insight, experts discuss methods for detecting and preventing risky or anomalous end user behavior, as well as methods for preventing unauthorized access and transfer of data by end users. You'll also get insight on the evolution of technology used to prevent accidental data leaks, such as data leak protection (DLP) and alternatives.

Inside this report:

  • Detecting and Preventing Insider Data Leaks
  • Over-Sharer or Troublemaker? How to Identify Insider-Risk Personas
  • Dealing With Insider Threats in the Age of COVID
  • Modern Day Insider Threat:Network Bugs That Are Stealing Your Data

The information submitted is collected by both Informa Tech and our sponsor Code42. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Building the SOC of the Future

by Dark ReadingFeb 10, 2021

No matter what your industry, your organization's size, or the number of work-from-home staff you have, there is a growing need to monitor your systems for potential threats—and have the capacity to respond quickly in the event of a compromise. To build out this capacity, many enterprises are building or expanding their security operations centers (SOCs) to improve their ability to detect and respond to cyber threats. In this special report, experts offer insight and recommendations on how to build a next-generation SOC, and what tools and skills you may need to outfit that SOC to respond to today's most current threats and online exploits.

Inside this report:

  • Why and How to Understand Your Cyber Attackers
  • How Advanced Attackers Take Aim at Office 365
  • Criminals Turn to IM Platforms to Avoid Law Enforcement Scrutiny
  • Mobile Phishing Attacks Increase Sharply
  • Targeted Discovery: Why Attack Surface Management Isn't Enough

The information submitted is collected by both Informa Tech and our sponsor Infoblox. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: The State of Threat Detection and Response

by Dark ReadingDec 14, 2020

Many organizations have invested in improving their threat detection capabilities over the past two years and express increased confidence in their ability to stop threats that have penetrated the network perimeter. However, these organizations also cite a number of weaknesses and areas for further improvement, including limited log visibility, limited threat visibility, and an over-reliance on manual processes.

In 2020, Dark Reading surveyed IT and cybersecurity professionals to understand the technologies and processes they are using to detect threats, identify exposure to specific exploits, and search for incursions in historic log data. This research, conducted on behalf of Anomali, was used for the basis of our report. Download "The State of Threat Detection and Response" to learn about the tools organizations use to assess their organization's threat detection capabilities and identify the limitations and challenges that might be hampering that ability.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Digital Editorial Content: 2020: The Year in Security

by Dark ReadingDec 07, 2020

COVID-19 upended the security world in 2020. With employees moving to remote home offices, organizations were forced to enhance their endpoint security, while many were facing tighter budgets amid a pandemic-ailing economy. This new normal also emboldened cybercriminals to pivot their attacks to remote workers, targeting virtual private networks and collaboration platforms such as Zoom, and waves of coronavirus-related spam and phishing lures.

Download Dark Reading's Tech Digest 2020: The Year in Security for a look at the biggest security stories that — so far — have shaped a very strange and stressful year.

Here's what's inside:

  • Overview: 2020 - The Year in Security
  • As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints
  • Criminals Selling Video Conferencing Credentials on Dark Web
  • Maze Ransomware Operators Step Up Their Game
  • 'Ripple20' Bugs Plague Enterprise, Industrial & Medical IoT Devices
  • Microsoft Patches Wormable RCE Flaw in Windows DNS Servers
  • Plus a whole lot more!
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policyDomainToolsCBTS

This digital issue is sponsored by:

DomainTools Logo
CBTS Logo


Research Report: Assessing Cybersecurity Risk in Today’s Enterprises

by Dark ReadingDec 04, 2020

COVID-19 has created a new IT paradigm in the enterprise — and a new level of cybersecurity risk.

The COVID-19 pandemic has created an entirely new range of cybersecurity risks for enterprises in 2020. Thanks to the overnight shift of workers moving to home bases, organizations saw new threats to things like home networks, mobile devices, and collaboration tools.

Dark Reading's 2020 Strategic Security Survey shows that a high percentage of organizations are struggling to minimize these unexpected risks. A majority of the respondents to our survey expressed confidence in their ability to assess and manage enterprise cyber-risk. However, our data also show that organizations face a slew of challenges — many of them related to COVID-19 — that could undermine risk management efforts in the coming year.

Download Dark Reading's Assessing Cybersecurity Risk in Today's Enterprises report for a detailed look at how enterprises are assessing and managing cyber-risk under the new normal.

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: 2021 Top Enterprise IT Trends

by Dark ReadingNov 16, 2020

We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.

Here's what's inside:

  • Businesses Rethink Endpoint Security for 2021
  • Ransomware Will Not Slow Down in 2021
  • Wrestling With New Vulnerabilities, Security Teams Seek Automation For Cloud Security
  • Plus, other 2021 Trends from Data Center Knowledge, InformationWeek, ITPro Today, Network Computing

The information submitted is collected by both Informa Tech and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by: