The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Deciphering the Hype Around XDR
Feb 16, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Deciphering the Hype Around XDR
Feb 16, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Deciphering the Hype Around XDR
Feb 16, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Cloud
6 MIN READ
slideshow
8 Hot Summer Fiction Reads for Cybersecurity Pros
A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.
Steve Zurier
Contributing Writer, Dark Reading
July 27, 2022
PDF
1/9
Next slide
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
Subscribe
More Insights
White Papers
How Machine Learning, AI & Deep Learning Improve Cybersecurity
State of Email Security
More White Papers
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Deciphering the Hype Around XDR
More Webinars
Reports
The Promise and Reality of Cloud Security
10 Hot Talks From Black Hat USA 2022
More Reports
Editors' Choice
Nearly All Firms Have Ties With Breached Third Parties
Robert Lemos, Contributing Writer, Dark Reading
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover
Nate Nelson, Contributing Writer, Dark Reading
Beating the Odds: 3 Challenges Women Face in the Cybersecurity Industry
Shikha Kothari, Senior Security Adviser, Eden Data
Phishers Trick Microsoft Into Granting Them 'Verified' Cloud Partner Status
Nate Nelson, Contributing Writer, Dark Reading
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Deciphering the Hype Around XDR
The Ransomware Evolution: Protecting Against Professionalized Cybercriminal Operations
Shoring Up the Software Supply Chain Across Enterprise Applications
The Importance of Bespoke Security
More Webinars
Reports
The Promise and Reality of Cloud Security
10 Hot Talks From Black Hat USA 2022
How Machine Learning, AI & Deep Learning Improve Cybersecurity
SANS 2021 Cloud Security Survey
State of the Intelligent Information Management Industry in 2021
More Reports
White Papers
How Machine Learning, AI & Deep Learning Improve Cybersecurity
State of Email Security
Ransomware Resilience and Response: The Next-Generation
Ransomware Is On The Rise
State of Ransomware Readiness: Facing the Reality Gap
More White Papers
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
More Events
More Insights
White Papers
How Machine Learning, AI & Deep Learning Improve Cybersecurity
State of Email Security
More White Papers
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Deciphering the Hype Around XDR
More Webinars
Reports
The Promise and Reality of Cloud Security
10 Hot Talks From Black Hat USA 2022
More Reports