The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Tips for A Streamlined Transition to Zero Trust
Oct 05, 2023
Using AI in Application Security Tooling
Oct 12, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Tips for A Streamlined Transition to Zero Trust
Oct 05, 2023
Using AI in Application Security Tooling
Oct 12, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Tips for A Streamlined Transition to Zero Trust
Oct 05, 2023
Using AI in Application Security Tooling
Oct 12, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Think Like an Attacker: Understanding Cybercriminals & Nation-State Threat Actor | Nov 16 Virtual Event <REGISTER NOW>
Previous
Next
Cloud
6 MIN READ
slideshow
8 Hot Summer Fiction Reads for Cybersecurity Pros
A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.
Steve Zurier
Contributing Writer, Dark Reading
July 27, 2022
PDF
1/9
Next slide
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
Subscribe
More Insights
White Papers
Evaluating SASE for the Work-From-Anywhere Era
Work From Anywhere Doesn't Have to Be Complicated
More White Papers
Webinars
Tips for A Streamlined Transition to Zero Trust
Using AI in Application Security Tooling
More Webinars
Reports
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
The State of Supply Chain Threats
More Reports
Editors' Choice
MGM, Caesars Cyberattack Responses Required Brutal Choices
Becky Bracken, Editor, Dark Reading
Do CISOs Have to Report Security Flaws to the SEC?
Evan Schuman, Contributing Writer, Dark Reading
NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII
Tara Seals, Managing Editor, News, Dark Reading
Cisco Moves Into SIEM With $28B Deal to Acquire Splunk
Jeffrey Schwartz, Contributing Writer, Dark Reading
Webinars
Tips for A Streamlined Transition to Zero Trust
Using AI in Application Security Tooling
The Enterprise View to Cloud Security
Fundamentals of a Cyber Risk Assessment
DevSecOps for Mobile App Development
More Webinars
Reports
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
The State of Supply Chain Threats
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
More Reports
White Papers
Evaluating SASE for the Work-From-Anywhere Era
Work From Anywhere Doesn't Have to Be Complicated
9 Traits You Need to Succeed as a Cybersecurity Leader
2023 Global Future of Cyber Report
Cybersecurity in a post pandemic world: A focus on financial services
More White Papers
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Black Hat Japan Trainings - Nov 13-14 - Learn More
More Events
More Insights
White Papers
Evaluating SASE for the Work-From-Anywhere Era
Work From Anywhere Doesn't Have to Be Complicated
More White Papers
Webinars
Tips for A Streamlined Transition to Zero Trust
Using AI in Application Security Tooling
More Webinars
Reports
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
The State of Supply Chain Threats
More Reports