New & Notable
News
Cybersecurity awareness news brief: What works, what doesn't
Check out the latest security news from the Informa TechTarget team.
Manage
Cybersecurity Awareness Month: The endpoint security issue
Device diversity and hybrid work models challenge IT teams. New research reveals the gap between managed endpoints and actual security coverage.
Evaluate
SIEM benefits and features in the modern SOC
Security information and event management has evolved significantly since it was first introduced 20 years ago. Today's SIEMs offer a wide range of capabilities.
Get Started
Cybersecurity awareness quiz: Questions and answers
From phishing to patching, file sharing to MFA, find out how much you know about preventing cybersecurity incidents in this security awareness training quiz.
Trending Topics
- 
					Data Security & Privacy Get Started6 confidential computing use cases that secure data in useConfidential computing bridges a critical security gap by encrypting data in use. Learn about its enterprise use cases, from AI protection to data sovereignty. 
- 
					Threats & Vulnerabilities NewsNews brief: National cyberdefenses under mounting pressureCheck out the latest security news from the Informa TechTarget team. 
- 
					IAM ManageTop 7 password hygiene tips and best practicesPasswords enable users to access important accounts and data, making them attractive targets to attackers, too. Follow these password hygiene tips to keep your organization safe. 
- 
					Analytics & Automation ManageChange is in the wind for SecOps: Are you ready?Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game. 
- 
					Network Security ManageCybersecurity Awareness Month: The endpoint security issueDevice diversity and hybrid work models challenge IT teams. New research reveals the gap between managed endpoints and actual security coverage. 
- 
					Operations & Management Get StartedHow to write an information security policy, plus templatesFaced with multiplying security threats and complex IT environments, companies need comprehensive policies that detail how they will protect their systems and respond to attacks. 
Sponsored Sites
- 
                        SecurityOne Identity | Integrated Cybersecurity for all Your Identities  Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources. 
- 
                        Artificial IntelligenceIntel & Red Hat: Leading the way in Enterprise AI  Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions. 
- 
                        Artificial IntelligenceIntel & Red Hat: Leading the way in Enterprise AI  Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions. 
Topics Covered
- Application and platform security
- Careers and certifications
- Cloud security
- Compliance
- Data security and privacy
- Identity and access management
- Network security
- Risk management
- Security analytics and automation
- Security operations and management
- Threat detection and response
- Threats and vulnerabilities
Find Solutions For Your Project
- 
					EvaluateSIEM benefits and features in the modern SOCSecurity information and event management has evolved significantly since it was first introduced 20 years ago. Today's SIEMs offer a wide range of capabilities. - 
										How single-vendor SASE can deliver better security results
- 
										7 top deception technology vendors for active defense
- 
										How CISOs can get out of security debt and why it matters
 
- 
										
- 
					Problem SolveCybersecurity awareness news brief: What works, what doesn'tCheck out the latest security news from the Informa TechTarget team. - 
										Cybersecurity Awareness Month: The endpoint security issue
- 
										How to use Gophish to fortify security awareness training
- 
										How to use arp-scan to discover network hosts
 
- 
										
- 
					ManageTop 7 password hygiene tips and best practicesPasswords enable users to access important accounts and data, making them attractive targets to attackers, too. Follow these password hygiene tips to keep your organization safe. - 
										Identity security tool sprawl: Origins and the way forward
- 
										7 key types of application security testing
- 
										What to know about 5G security threats in the enterprise
 
- 
										
Information Security Basics
- 
							Get StartedHow to write an information security policy, plus templatesFaced with multiplying security threats and complex IT environments, companies need comprehensive policies that detail how they will protect their systems and respond to attacks. 
- 
							Get StartedWhat is data masking?Data masking is a security technique that modifies sensitive data in a data set so it can be used safely in a non-production environment. 
- 
							Get StartedCybersecurity awareness quiz: Questions and answersFrom phishing to patching, file sharing to MFA, find out how much you know about preventing cybersecurity incidents in this security awareness training quiz. 
Multimedia
- 
			  Get StartedAn explanation of quantum key distribution
- 
			  Get StartedAn explanation of post-quantum cryptography
- 
			  Get StartedAn explanation of quantum cryptography
- 
						NewsView All
- 
								Security operations and managementCybersecurity awareness news brief: What works, what doesn'tCheck out the latest security news from the Informa TechTarget team. 
- 
								Threats and vulnerabilitiesNews brief: National cyberdefenses under mounting pressureCheck out the latest security news from the Informa TechTarget team. 
- 
								Threat detection and responseNews brief: AI's cybersecurity risks weigh on business leadersCheck out the latest security news from the Informa TechTarget team. 
Search Security Definitions
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?
- What is COMSEC (communications security)?






