New & Notable
News
News brief: Patch critical SAP, Samsung and chat app flaws now
Check out the latest security news from the Informa TechTarget team.
News
RSAC Conference 2025
Follow SearchSecurity's RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
Evaluate
DLP in the GenAI Era: Shadow data and DLP product churn
Recent Enterprise Strategy Group research found data loss prevention product churn combined with undiscovered data and shadow IT are changing the DLP landscape.
News
News brief: AI security risks highlighted at RSAC 2025
Check out the latest security news from the Informa TechTarget team.
Trending Topics
-
Data Security & Privacy Evaluate
DLP in the GenAI Era: Shadow data and DLP product churn
Recent Enterprise Strategy Group research found data loss prevention product churn combined with undiscovered data and shadow IT are changing the DLP landscape.
-
Threats & Vulnerabilities Manage
AI model theft: Risk and mitigation in the digital era
Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property.
-
IAM Manage
RSAC 2025 Conference: Identity security highlights
RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Evaluate
Key network security takeaways from RSAC 2025
Themes on display at the conference reflected the cybersecurity industry's effort to streamline security operations, while adapting to emerging technologies and threats.
-
Operations & Management News
RSAC Conference 2025
Follow SearchSecurity's RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
Sponsored Sites
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
DLP in the GenAI Era: Shadow data and DLP product churn
Recent Enterprise Strategy Group research found data loss prevention product churn combined with undiscovered data and shadow IT are changing the DLP landscape.
-
Key network security takeaways from RSAC 2025
-
10 leading open source application security testing tools
-
RSAC 2025: The time for crypto-agility adoption is now
-
-
Problem Solve
How to spot and expose fraudulent North Korean IT workers
North Koreans have infiltrated countless U.S. companies as remote IT workers. That means your top developer could also work for one of the world's most notorious dictators.
-
How to use arpwatch to monitor network changes
-
Top 5 ransomware attack vectors and how to avoid them
-
How to create custom sudo configuration files in /etc/sudoers
-
-
Manage
AI model theft: Risk and mitigation in the digital era
Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property.
-
RSAC 2025 Conference: Identity security highlights
-
How payment tokenization works and why it's important
-
DLP vs. DSPM: What's the difference?
-
Information Security Basics
-
Get Started
What is a firewall and why do I need one?
A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules.
-
Get Started
What is risk appetite?
Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.
-
Get Started
What is penetration testing?
A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.
Multimedia
-
News
View All -
Application and platform security
News brief: Patch critical SAP, Samsung and chat app flaws now
Check out the latest security news from the Informa TechTarget team.
-
RSAC 2025: AI everywhere, trust nowhere
We're at an inflection point. AI is changing the game, but the rules haven't caught up.
-
Building effective security programs requires strategy, patience and clear vision
Capital One executives share insights on how organizations should design their security programs, implement passwordless technologies, and reduce their attack surface.
Search Security Definitions
- What is a firewall and why do I need one?
- What is risk appetite?
- What is penetration testing?
- What is a security operations center (SOC)?
- What is a risk profile? Definition, examples and types
- What is risk reporting?
- What is a registration authority (RA)?
- What is a risk map (risk heat map)?