New & Notable

Manage

AI model theft: Risk and mitigation in the digital era

Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property.

News

News brief: Patch critical SAP, Samsung and chat app flaws now

Check out the latest security news from the Informa TechTarget team.

News

RSAC Conference 2025

Follow SearchSecurity's RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.

Evaluate

DLP in the GenAI Era: Shadow data and DLP product churn

Recent Enterprise Strategy Group research found data loss prevention product churn combined with undiscovered data and shadow IT are changing the DLP landscape.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is a firewall and why do I need one?

    A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules.

  • Get Started

    What is risk appetite?

    Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.

  • Get Started

    What is penetration testing?

    A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security