Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.

Our Website: http://darkreading.com


Latest Content From Dark Reading

Digital Editorial Content: Navigating the Deluge of Security Data

by Dark ReadingNov 12, 2019

In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. System logs, security tools, network telemetry, endpoint, and mobile reports may all provide clues that help reveal a cyberattack. We examine some examples of how enterprises can cull this data to find the clues they need.

Here's what's inside:

  • Navigating the Deluge of Security Data
    • System logs, security tools, network telemetry, endpoint, and mobile reports may all provide clues that help reveal a cyberattack. Some top security practitioners share their experiences.
  • Overburdened SOC Analysts Shift Priorities
    • Many SOC analysts are starting to shut off high-alert features to keep pace with the volume, new study shows.
  • Microsoft Debuts Azure Sentinel SIEM, Threat Experts Service
    • Services arrive at a time when two major trends are converging on security.
  • Better Cybersecurity Research Requires More Data Sharing
    • Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to breach information.
  • Don't Just Tune Your SIEM, Retune It
    • Your SIEM isn't a set-it-and-forget-it proposition.
The information submitted is collected by both Informa Tech and our sponsors.
Informa Tech's privacy policy.
ExtraHop NetworksCofenseSplunkCarbon BlackWhiteHat SecuritySpyCloudTenableeSentireDomainTools Reversing LabsThreat ConnectLaceworkBlueVoyantSignal Sciences

This digital issue is sponsored by:
Sponsor_logos


Webcast: Strategies for Protecting Mission-Critical Data

by Dark ReadingNov 06, 2019

Whether it’s customer lists, intellectual property, or a secret recipe, your mission-critical data is what makes your organization unique – the lifeblood of your enterprise. Yet, with one shrewd exploit, an online attacker – or even one of your own employees – could break the security of that critical information. What steps should you be taking to protect it?

Strategies For Protecting Mission-Critical Data, a free, all-day online conference produced by the editors of Dark Reading, offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. You’ll get insight on how to store critical information securely, and how to ensure its security when it is passed across networks. Top security experts will discuss data encryption strategies, on-premises infrastructure defenses, and how to protect mission-critical data across cloud services, network providers, and partner/supplier environments. You’ll get expert viewpoints and recommendations on how to protect your mission-critical data, and advice on how to identify and protect sensitive data that might be handled outside the IT department’s knowledge or control.

Among the topics that will be covered at Strategies for Protecting Mission-Critical Data:

  • Processes and best practices for identifying sensitive data across the enterprise
  • Tips and tools for ensuring that even “trusted users” cannot access or exfiltrate important data without authorization
  • The latest technologies and strategies for protecting on-premises infrastructure, including networks, servers, and storage systems
  • Strategies for encrypting sensitive information, both in storage and in motion across networks
  • Methods for ensuring that business partners handle sensitive information as securely as your own users
  • Recommendations for working with cloud operators and other service providers to ensure the security of data traveling across their networks
  • Special steps you can take to provide extra protection for your most essential data and information

If you want to know more about the available tools and best practices for protecting mission-critical data from cyberattack – and get some help choosing the right methods and technologies for your own organization -- then this virtual event is for you. Register today!


Webcast: Strategies for Protecting Mission-Critical Data

by Dark ReadingNov 06, 2019

Whether it’s customer lists, intellectual property, or a secret recipe, your mission-critical data is what makes your organization unique – the lifeblood of your enterprise. Yet, with one shrewd exploit, an online attacker – or even one of your own employees – could break the security of that critical information. What steps should you be taking to protect it?

Strategies For Protecting Mission-Critical Data, a free, all-day online conference produced by the editors of Dark Reading, offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. You’ll get insight on how to store critical information securely, and how to ensure its security when it is passed across networks. Top security experts will discuss data encryption strategies, on-premises infrastructure defenses, and how to protect mission-critical data across cloud services, network providers, and partner/supplier environments. You’ll get expert viewpoints and recommendations on how to protect your mission-critical data, and advice on how to identify and protect sensitive data that might be handled outside the IT department’s knowledge or control.


Research Report: Rethinking Enterprise Data Defense

by Dark ReadingNov 01, 2019

What are the chief concerns of today's enterprise data defenders? What technologies and best practices do they find to be most effective in preventing compromises, and what methods have they found to make better use of their staffing and funding resources? In this survey we ask security professionals for insight on what they're doing that works - and what doesn't. Readers will get advice and recommendations from their peers on how to invest their IT security resources, and how to mitigate the latest attacks and exploits.

The information submitted is collected by both Informa and our sponsor. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: Assessing Cybersecurity Risk in Today's Enterprise

by Dark ReadingOct 29, 2019

Security leaders are struggling to understand their organizations' risk exposure. While many are confident in their security strategies and processes, they're also more concerned than ever about getting breached.

Dark Reading's annual 2019 Strategic Security survey reveals that many companies are uncertain about their data breach exposure because of growing threat sophistication, increasing attack volumes, and many other factors. A high percentage of IT leaders see employees as presenting as big a breach risk as external cybercriminals and nation-state actors.

Download this report and get insights on how today's enterprises assess and perceive the risks they face in 2019.

The information submitted is collected by both Informa Tech and our sponsor Anomali. Click here to view our sponsor's privacy policy.

This report is sponsored by:


Research Report: 2019 Online Malware and Threats: A Profile of Today's Security Posture

by Dark ReadingSep 30, 2019

Dark Reading's 2019 Malware and Threat Report shows that cybercriminals have ramped up their attack volumes sharply-- especially those involving phishing attempts, ransomware, and business email compromise (BEC). The constant pummeling is putting new strain on risk assessment and threat response processes in many organizations.

This report based on our 2019 survey reveals a high level of concern over several new and emerging threats, including attacks on cloud service providers, BEC scams, and attacks that use artificial intelligence techniques. For many organizations, risk assessment and response prioritization continue to be major challenges, and respondents are becoming frustrated by their vulnerability to human errors and negligence. Find out more by reading the report today.

  • Details
  • Research Report
  • 400 likes

Digital Editorial Content: 7 Threats & Disruptive Forces Changing the Face of Cybersecurity

by Dark ReadingAug 08, 2019

In this Tech Digest, Dark Reading examines the research revealed at Black Hat USA and takes a look at some of the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today. As digital disruption and advances in emerging technology such as AI, the Internet of Things, and automation enmesh IT into every part of society, cybersecurity grows more important than ever. Read this Report to learn more about the biggest emerging threats and disruptive forces challenging cybersecurity.

Here's what's inside:
• Building and Managing an IT Security Operations Program
• 7 Threats & Disruptive Forces That Are Changing the Face of Cybersecurity
• 'Human Side-Channels': Behavioral Traces We Leave Behind
• Researchers Poke Holes in Siemens Simatic S7 PLCs
• Inside MLS, the New Protocol for Secure Enterprise Messaging
• With GDPR's 'Right of Access,' Who Really Has Access?

The information submitted is collected by both Informa Tech and our sponsors.Informa Tech's privacy policy.
ExtraHop Networks •  LookingGlass Cyber •  Cofense •  Splunk •  eSentire •  Carbon Black •  WhiteHat Security •  CyberGRX •  Cymulate •  Aqua Security •  Synack •  BlueVoyant •  DarkTrace •  AT&T Cybersecurity  •  DomainTools  • 

This digital issue is sponsored by:
Sponsor_logos


Webcast: What to Do When Hackers Attack

by Dark ReadingJun 26, 2019

The worst has happened. Online attackers have penetrated your cyber defenses and are threatening your most sensitive data. What should you do now? In this fascinating and educational virtual event, you will hear advice and recommendations from some of the cybersecurity industry’s top experts and speakers on the critical issues of breach investigation and incident response.

This all-day online conference, produced by the editors of Dark Reading, will help you and your organization prepare for those “very bad days” when you suspect that your mission-critical data has been compromised. Attend the event and you’ll hear about tools and best practices for detecting a breach – even when it’s well-obfuscated – and how to analyze multiple indications of compromise to reveal a sophisticated attack. You’ll also receive first-hand expertise on what to do in the first hours of a major breach, whether to pull the plug on infected systems, and when to call in law enforcement. Best of all, you’ll get expert advice on how to determine the extent of a data compromise, how to stop it, how to remediate your systems, and how to handle legal and business consequences that may follow.


Digital Editorial Content: Dark Reading - Check out Our Newsletters

by Dark ReadingJun 24, 2019

Subscribe to the Dark Reading newsletters and get your daily/weekly dose of news, analysis, and glimpse into the chaos and mystery of network and data security.


Research Report: How Enterprises Are Using IT Threat Intelligence

by Dark ReadingMay 29, 2019

Concerns over nation-state actors and other security threats are driving enterprises to rethink the way they collect and analyze cybersecurity data. A high percentage of organizations are seeking to augment their internal telemetry with external threat data so they can identify and respond to potential data compromises faster. However, collecting and analyzing threat intelligence is no easy task — early implementers report being slowed by manual data correlation and analysis processes.