New & Notable
News
News brief: Safeguards emerge to address security for AI
Check out the latest security news from the Informa TechTarget team.
News
How outer space became the next big attack surface
VisionSpace Technologies' Andrzej Olchawa and Milenko Starcik discussed a set of vulnerabilities capable of ending space missions at the Black Hat USA 2025 News Desk.
— Dark ReadingNews
How to vibe code with security in mind
As more organizations integrate vibe coding and AI-assisted coding into their application development processes, it's important to remember to put security first.
— Dark ReadingNews
AI agents access everything, fall to zero-click exploit
Zenity CTO Michael Bargury joins the Black Hat USA 2025 News Desk to discuss research on a dangerous exploit, how generative AI technology has "grown arms and legs" -- and what that means for cyber-risk.
— Dark ReadingTrending Topics
-
Data Security & Privacy Manage
Identity and data security themes at Black Hat 2025
Read about the identity and data security happenings at Black Hat 2025, including advancements that enable AI adoption and products that help prepare for a post-quantum world.
-
Threats & Vulnerabilities News
The latest from Black Hat USA 2025
This is your guide to the breaking news, trending topics and more from Black Hat USA 2025, one of the world's top cybersecurity conferences.
-
IAM Manage
How liveness detection catches deepfakes and spoofing attacks
Biometric liveness detection can stop fake users in their tracks. Learn how the technology works to distinguish real humans from deepfakes and other spoofing attacks.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Get Started
Use ssh-keygen to generate new key pairs: A full tutorial
Use ssh-keygen to create new key pairs, copy host keys, use a single login key pair for multiple hosts, retrieve key fingerprints and more.
-
Operations & Management
News brief: Rising OT threats put critical infrastructure at risk
Check out the latest security news from the Informa TechTarget team.
Sponsored Sites
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Black Hat 2025: Navigating AI and supply chain security
Experts at the conference will discuss how AI impacts software supply chain security, highlighting challenges and strategies for developers and security teams.
-
Is post-quantum cryptography the next Y2K?
-
Top DevSecOps certifications and trainings for 2025
-
How to perform a cybersecurity risk assessment in 5 steps
-
-
Problem Solve
How to prevent DoS attacks and what to do if they happen
The worst DoS attacks are like digital tsunamis that put critical business operations at risk. Learn how they work, ways to stop them and how systems can withstand the flood.
-
How to recover from a ransomware attack: A complete guide
-
How to remove ransomware, step by step
-
How to discover and manage shadow APIs
-
-
Manage
Two teams, three teams, red, blue and purple teams
Red teams attack, blue teams defend and purple teams facilitate collaboration. Together, they strengthen cybersecurity through simulated exercises and knowledge sharing.
-
Use an AI gateway to secure AI models and applications
-
Identity and data security themes at Black Hat 2025
-
Shift left with these 11 DevSecOps best practices
-
Information Security Basics
-
Get Started
Use ssh-keygen to generate new key pairs: A full tutorial
Use ssh-keygen to create new key pairs, copy host keys, use a single login key pair for multiple hosts, retrieve key fingerprints and more.
-
Get Started
An explanation of quantum key distribution
Quantum key distribution uses physics to create secure encryption keys that detect eavesdropping instantly, offering a quantum-safe solution for future cybersecurity challenges.
-
Get Started
An explanation of post-quantum cryptography
Quantum computers threaten to break today's encryption protocols. Post-quantum cryptography aims to develop new algorithms resistant to quantum attacks before it's too late.
Multimedia
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
Get Started
An explanation of quantum cryptography
-
News
View All -
Risk management
News brief: Safeguards emerge to address security for AI
Check out the latest security news from the Informa TechTarget team.
-
How outer space became the next big attack surface
VisionSpace Technologies' Andrzej Olchawa and Milenko Starcik discussed a set of vulnerabilities capable of ending space missions at the Black Hat USA 2025 News Desk.
-
How to vibe code with security in mind
As more organizations integrate vibe coding and AI-assisted coding into their application development processes, it's important to remember to put security first.
Search Security Definitions
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?
- What is COMSEC (communications security)?
- What is the Mitre ATT&CK framework?
- What is a CISO (chief information security officer)?
- What is biometric authentication?
- What is cybersecurity?
- What is cloud infrastructure entitlement management (CIEM)?