Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Practical Cyber Defense for Industrial Control Systems

by Nozomi NetworksJan 03, 2019

Industrial control systems (ICS) environments are being targeted by more sophisticated threats every day; but the security professionals who defend ICS environments face significant limitations. Patching practices and scanning tools that are common in most IT environments are often unacceptable for ICS, which may operate critical infrastructure and require 24/7 uptime. In this Dark Reading webinar, top experts offers insight on the threat posed to ICS systems, and how you can expand your

Security and Privacy vs. Innovation: The Great Balancing Act

by InformationWeekFeb 12, 2019

Emerging technologies like the Internet of Things, artificial intelligence, machine learning, and advanced mobile applications can help a company reap the benefits of better customer relations, operational efficiencies, and increased revenues. However, each of those technologies present security risks to corporate and customer data. They may clash with the demands of best security practices and government and industry regulations.

This InformationWeek IT Trend Report will help you

IoT Security for Connected Spaces - Frost and Sullivan WP

by Cloakware by IrdetoJul 30, 2018

The success of IoT deployments heavily depends on data security, privacy and device interoperability. However, many IoT endpoints used in Connected Spaces do not incorporate anything more than the very basic security measures.

The Necessity of Software Protection - The Cloakware Report

by Cloakware by IrdetoJul 30, 2018

We live in a software-defined, connected world. Yet, most device and application deployments do not protect themselves against even the most common attacks. This report looks at how criminal hacks evolve and shows how to apply defense in depth security to protect connected devices and software.

Inside the mind of a hacker

by Cloakware by IrdetoJul 30, 2018

Criminal hackers work like any other business, as part of commercial - albeit illegal - networks, with clear business models. We have come a long way from the lone hacker stereotype. This e-book details what drives criminal hackers and how they go about realizing their goals.

Cybersecurity for Digital Twins

by Cloakware by IrdetoFeb 12, 2019

Given the recent amount of interest in digital twins, you'd be forgiven for thinking it's a radical new concept. But the reality is that digital twins have been around for decades, known more commonly as emulators, simulators or clones. Twinning was traditionally used by companies to manage very large and complex assets; twins were developed in-house and often built using proprietary toolsets.

Cloakware Report 2: Protect your software. Protect your business.

by Cloakware by IrdetoSep 11, 2018

In an industry driven by the fear factor, it is important to look at software protection in a different way: that of a business enabler.

In this Cloakware® report we are introducing the 3 main business drivers for investing in a good software protection strategy: IP protection preserves value Software protection helps avoid regulatory liabilities Protected ecosystems drive revenues

Can Proactive Threat Hunting Save Your Business?

by ReversingLabsFeb 08, 2019

Despite legacy investments in cybersecurity, businesses remain highly vulnerable to cyber threats. This continues to happen in large part because infosec teams that were originally established to close the gap between off-the-shelf technology and the actual zero-day threats are not sufficiently resourced or properly structured to identify and quarantine unknown malicious content.

Fortunately, recent breakthroughs in cybersecurity technology now empower infosec staff at all skill

5 Emerging Cyber Threats to Watch for in 2019

by Dark ReadingFeb 04, 2019

Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.

IN THIS ISSUE: 5 Emerging Cyber Threats to Watch for in 2019Who Takes Responsibility for Cyberattacks in the Cloud? Spending Spree: What's on Security

Kubernetes Security – Operating Kubernetes Clusters and Applications Safely

by Aqua Security Software Inc.Feb 07, 2019

Liz Rice from Aqua Security and Michael Hausenblas from Red Hat describe practical security techniques for Kubernetes. Developers will learn how to build container images with security in mind, and ops folks will pick up techniques for configuring and operating a Kubernetes cluster more securely.


Aqua Security Software Inc.

Headquarters: 800 District Avenue,  Suite 310 Burlington, MA 01803

Aqua Security enables enterprises to secure their container-based and cloud-native applications from development to production, accelerating container adoption and bridging the gap between DevOps and IT security. Aqua's Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance.

Cloakware by Irdeto

A security breach or a serious hack can be devastating to a company's brand. The damage - financial and reputational - could be so great that a business may never fully recover. Irdeto's Cloakware cybersecurity technology, products and solutions have been securing digital assets for 20 years. Irdeto was the inventor of whitebox cryptography and its Cloakware solutions are differentiated by its rich history of innovation and built-in diversity and renewability features.

Irdeto is a leader in cybersecurity and currently secures over 5 billion devices and applications as well as providing a wide range of security services for various industries, including media & entertainment, automotive and IoT connected industries.

Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Headquarters: 2 Penn Plaza, 15th Floor, New York, NY, 10121 United States

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


We have a simple mission: To use our experience and expertise from the security world to provide state of the art solutions for organizations to protect all their digital assets.