New & Notable
Problem Solve
How to discover and manage shadow APIs
Connecting applications, especially if external-facing, with unapproved APIs is a recipe for disaster. Detecting and managing shadow APIs is vital to keeping the company secure.
Manage
How to implement security control rationalization
Security control rationalization helps CISOs reduce cybersecurity tool sprawl, cut spending and improve efficiency -- all without compromising protection.
Get Started
An explanation of risk management for businesses
Risk management transforms uncertainty into opportunity by identifying threats, evaluating impacts and implementing strategic controls to protect and enhance business value.
Get Started
How extortionware, cyberextortion and ransomware differ
Prevention is the only line of defense against an extortionware attack. Learn how extortionware works and why it can be more damaging than ransomware.
Trending Topics
-
Data Security & Privacy Get Started
An explanation of data breaches
Data breaches can be intentional or accidental and come in various forms, but all types have the potential to cause considerable harm to individuals and organizations.
-
Threats & Vulnerabilities News
News brief: SharePoint attacks hammer globe
Check out the latest security news from the Informa TechTarget team.
-
IAM Get Started
An explanation of identity and access management
Identity and access management systems safeguard businesses by controlling digital identities, managing access rights and implementing security protocols.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Get Started
An explanation of firewall types and uses
Firewalls protect networks by stopping malware at the perimeter. The various types can be deployed with other security measures but can also be used unethically to prohibit access.
-
Operations & Management Manage
How to implement security control rationalization
Security control rationalization helps CISOs reduce cybersecurity tool sprawl, cut spending and improve efficiency -- all without compromising protection.
Sponsored Sites
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Top DevSecOps certifications and trainings for 2025
DevOps Institute, Practical DevSecOps, EXIN and EC-Council are among the organizations that offer DevSecOps certifications and trainings for cybersecurity professionals.
-
How to perform a cybersecurity risk assessment in 5 steps
-
What is the future of cybersecurity?
-
What is risk management? Importance, benefits and guide
-
-
Problem Solve
How to discover and manage shadow APIs
Connecting applications, especially if external-facing, with unapproved APIs is a recipe for disaster. Detecting and managing shadow APIs is vital to keeping the company secure.
-
How to calculate cybersecurity ROI for CEOs and boards
-
Phishing prevention: How to spot, stop and respond to scams
-
CISO playbook for securing AI in the enterprise
-
-
Manage
How to implement security control rationalization
Security control rationalization helps CISOs reduce cybersecurity tool sprawl, cut spending and improve efficiency -- all without compromising protection.
-
CISO role in ASM could add runtime security, tokenization
-
How to build a cybersecurity team to maximize business impact
-
AI in risk management: Top benefits and challenges explained
-
Information Security Basics
-
Get Started
An explanation of risk management for businesses
Risk management transforms uncertainty into opportunity by identifying threats, evaluating impacts and implementing strategic controls to protect and enhance business value.
-
Get Started
How extortionware, cyberextortion and ransomware differ
Prevention is the only line of defense against an extortionware attack. Learn how extortionware works and why it can be more damaging than ransomware.
-
Get Started
An explanation of firewall types and uses
Firewalls protect networks by stopping malware at the perimeter. The various types can be deployed with other security measures but can also be used unethically to prohibit access.
Multimedia
-
Get Started
An explanation of risk management for businesses
-
Get Started
An explanation of firewall types and uses
-
Get Started
An explanation of data breaches
-
News
View All -
Threats and vulnerabilities
News brief: SharePoint attacks hammer globe
Check out the latest security news from the Informa TechTarget team.
-
Threats and vulnerabilities
News brief: Cyberattack trends signal security arms race
Check out the latest security news from the Informa TechTarget team.
-
Knostic wins 2024 Black Hat Startup Spotlight Competition
During a 'Shark Tank'-like final, each startup's representative spent five minutes detailing their company and product, with an additional five minutes to take questions from eight judges from Omdia, investment firms, and top companies in cyber.
Search Security Definitions
- What is a CISO (chief information security officer)?
- What is biometric authentication?
- What is cybersecurity?
- What is cloud infrastructure entitlement management (CIEM)?
- What is a CISO as a service (CISOaaS)?
- What is post-quantum cryptography? Comprehensive guide
- What is a message authentication code (MAC)? How it works and best practices
- What is SIEM (security information and event management)?