New & Notable
Manage
How to write a data classification policy, with template
Data classification policies help organizations categorize, secure and manage sensitive information while maintaining regulatory compliance and reducing breach risks.
Get Started
An explanation of post-quantum cryptography
Quantum computers threaten to break today's encryption protocols. Post-quantum cryptography aims to develop new algorithms resistant to quantum attacks before it's too late.
Get Started
SSH tunneling explained: A tutorial on SSH port forwarding
SSH tunneling creates secure encrypted connections through private and untrusted networks, enabling remote access, bypassing restrictions and protecting sensitive data transfers.
News
Black Hat NOC expands AI implementation across security operations
Corelight's James Pope gives Dark Reading an inside look at this year's Black Hat Network Operations Center, detailing security challenges and rising trends -- many related to increased AI use.
— Dark ReadingTrending Topics
-
Data Security & Privacy Get Started
An explanation of post-quantum cryptography
Quantum computers threaten to break today's encryption protocols. Post-quantum cryptography aims to develop new algorithms resistant to quantum attacks before it's too late.
-
Threats & Vulnerabilities News
The latest from Black Hat USA 2025
This is your guide to the breaking news, trending topics and more from Black Hat USA 2025, one of the world's top cybersecurity conferences.
-
IAM Manage
How liveness detection catches deepfakes and spoofing attacks
Biometric liveness detection can stop fake users in their tracks. Learn how the technology works to distinguish real humans from deepfakes and other spoofing attacks.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Get Started
SSH tunneling explained: A tutorial on SSH port forwarding
SSH tunneling creates secure encrypted connections through private and untrusted networks, enabling remote access, bypassing restrictions and protecting sensitive data transfers.
-
Operations & Management
News brief: Rising OT threats put critical infrastructure at risk
Check out the latest security news from the Informa TechTarget team.
Sponsored Sites
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Black Hat 2025: Navigating AI and supply chain security
Experts at the conference will discuss how AI impacts software supply chain security, highlighting challenges and strategies for developers and security teams.
-
Is post-quantum cryptography the next Y2K?
-
Top DevSecOps certifications and trainings for 2025
-
How to perform a cybersecurity risk assessment in 5 steps
-
-
Problem Solve
How to prevent DoS attacks and what to do if they happen
The worst DoS attacks are like digital tsunamis that put critical business operations at risk. Learn how they work, ways to stop them and how systems can withstand the flood.
-
How to recover from a ransomware attack: A complete guide
-
How to remove ransomware, step by step
-
How to discover and manage shadow APIs
-
-
Manage
How to write a data classification policy, with template
Data classification policies help organizations categorize, secure and manage sensitive information while maintaining regulatory compliance and reducing breach risks.
-
Experts weigh in on securing AI effectively
-
Prevent and manage cloud shadow AI with policies and tools
-
AI security: Top experts weigh in on the why and how
-
Information Security Basics
-
Get Started
An explanation of post-quantum cryptography
Quantum computers threaten to break today's encryption protocols. Post-quantum cryptography aims to develop new algorithms resistant to quantum attacks before it's too late.
-
Get Started
SSH tunneling explained: A tutorial on SSH port forwarding
SSH tunneling creates secure encrypted connections through private and untrusted networks, enabling remote access, bypassing restrictions and protecting sensitive data transfers.
-
Get Started
What is governance, risk and compliance (GRC)?
Governance, risk and compliance (GRC) refers to an organization's strategy, or framework, for handling the interdependencies of the following three components: corporate governance policies, enterprise risk management programs, and regulatory and ...
Multimedia
-
Get Started
An explanation of post-quantum cryptography
-
Get Started
An explanation of quantum cryptography
-
-
News
View All -
Security operations and management
News brief: Rising OT threats put critical infrastructure at risk
Check out the latest security news from the Informa TechTarget team.
-
Black Hat NOC expands AI implementation across security operations
Corelight's James Pope gives Dark Reading an inside look at this year's Black Hat Network Operations Center, detailing security challenges and rising trends -- many related to increased AI use.
-
Researchers warn of 'hidden risks' in passwordless account recovery
Passwordless authentication is becoming more common, but account recovery poses increased risks that can lead to account takeovers. It's especially dangerous because even low-skilled attackers can achieve success.
Search Security Definitions
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?
- What is COMSEC (communications security)?
- What is the Mitre ATT&CK framework?
- What is a CISO (chief information security officer)?
- What is biometric authentication?
- What is cloud infrastructure entitlement management (CIEM)?
- What is cybersecurity?