New & Notable
Evaluate
Browser detection and response fills gaps in security programs
BDR is the latest tool to address detection and response as more and more communication occurs over Edge, Chrome and their counterparts. But does your organization really need it?
News
News brief: Nation-state threats evolve and escalate
Check out the latest security news from the Informa TechTarget team.
Get Started
How to write an information security policy, plus templates
Faced with multiplying security threats and complex IT environments, companies need comprehensive policies that detail how they will protect their systems and respond to attacks.
News
Cybersecurity awareness news brief: What works, what doesn't
Check out the latest security news from the Informa TechTarget team.
Trending Topics
- 
					
Data Security & Privacy Get Started
6 confidential computing use cases that secure data in use
Confidential computing bridges a critical security gap by encrypting data in use. Learn about its enterprise use cases, from AI protection to data sovereignty.
 - 
					
Threats & Vulnerabilities News
News brief: Nation-state threats evolve and escalate
Check out the latest security news from the Informa TechTarget team.
 - 
					
IAM Manage
Top 7 password hygiene tips and best practices
Passwords enable users to access important accounts and data, making them attractive targets to attackers, too. Follow these password hygiene tips to keep your organization safe.
 - 
					
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
 - 
					
Network Security Manage
Cybersecurity Awareness Month: The endpoint security issue
Device diversity and hybrid work models challenge IT teams. New research reveals the gap between managed endpoints and actual security coverage.
 - 
					
Operations & Management Get Started
How to write an information security policy, plus templates
Faced with multiplying security threats and complex IT environments, companies need comprehensive policies that detail how they will protect their systems and respond to attacks.
 
Sponsored Sites
- 
                        
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
                            Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
 - 
                        
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
                            Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
 - 
                        
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
                            Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
 
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
- 
					
Evaluate
Browser detection and response fills gaps in security programs
BDR is the latest tool to address detection and response as more and more communication occurs over Edge, Chrome and their counterparts. But does your organization really need it?
- 
										
SIEM benefits and features in the modern SOC
 - 
										
How single-vendor SASE can deliver better security results
 - 
										
7 top deception technology vendors for active defense
 
 - 
										
 - 
					
Problem Solve
Cybersecurity awareness news brief: What works, what doesn't
Check out the latest security news from the Informa TechTarget team.
- 
										
Cybersecurity Awareness Month: The endpoint security issue
 - 
										
How to use Gophish to fortify security awareness training
 - 
										
How to use arp-scan to discover network hosts
 
 - 
										
 - 
					
Manage
To maximize their influence, CISOs need diverse skills
In many organizations today, when the CISO talks, the CEO and board listen. CISOs who successfully rise to the occasion have broad skillsets.
- 
										
Top 7 password hygiene tips and best practices
 - 
										
Identity security tool sprawl: Origins and the way forward
 - 
										
7 key types of application security testing
 
 - 
										
 
Information Security Basics
- 
							
Get Started
How to write an information security policy, plus templates
Faced with multiplying security threats and complex IT environments, companies need comprehensive policies that detail how they will protect their systems and respond to attacks.
 - 
							
Get Started
What is data masking?
Data masking is a security technique that modifies sensitive data in a data set so it can be used safely in a non-production environment.
 - 
							
Get Started
Cybersecurity awareness quiz: Questions and answers
From phishing to patching, file sharing to MFA, find out how much you know about preventing cybersecurity incidents in this security awareness training quiz.
 
Multimedia
- 
			
			Get Started
An explanation of quantum key distribution
 - 
			
			Get Started
An explanation of post-quantum cryptography
 - 
			
			Get Started
An explanation of quantum cryptography
 
- 
						
News
View All - 
								
Threats and vulnerabilities
News brief: Nation-state threats evolve and escalate
Check out the latest security news from the Informa TechTarget team.
 - 
								
Security operations and management
Cybersecurity awareness news brief: What works, what doesn't
Check out the latest security news from the Informa TechTarget team.
 - 
								
Threats and vulnerabilities
News brief: National cyberdefenses under mounting pressure
Check out the latest security news from the Informa TechTarget team.
 
Search Security Definitions
- What is data masking?
 - What is antivirus software?
 - What is a stealth virus and how does it work?
 - What is file integrity monitoring (FIM)?
 
- What is information security (infosec)?
 - What is governance, risk and compliance (GRC)?
 - What is integrated risk management (IRM)?
 - What is COMSEC (communications security)?
 






