New & Notable
Get Started
How extortionware, cyberextortion and ransomware differ
Prevention is the only line of defense against an extortionware attack. Learn how extortionware works and why it can be more damaging than ransomware.
Evaluate
Top DevSecOps certifications and trainings for 2025
DevOps Institute, Practical DevSecOps, EXIN and EC-Council are among the organizations that offer DevSecOps certifications and trainings for cybersecurity professionals.
Get Started
An explanation of firewall types and uses
Firewalls protect networks by stopping malware at the perimeter. The various types can be deployed with other security measures but can also be used unethically to prohibit access.
Get Started
An explanation of data breaches
Data breaches can be intentional or accidental and come in various forms, but all types have the potential to cause considerable harm to individuals and organizations.
Trending Topics
-
Data Security & Privacy Get Started
An explanation of data breaches
Data breaches can be intentional or accidental and come in various forms, but all types have the potential to cause considerable harm to individuals and organizations.
-
Threats & Vulnerabilities News
News brief: Cyberattack trends signal security arms race
Check out the latest security news from the Informa TechTarget team.
-
IAM Get Started
An explanation of identity and access management
Identity and access management systems safeguard businesses by controlling digital identities, managing access rights and implementing security protocols.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Get Started
An explanation of firewall types and uses
Firewalls protect networks by stopping malware at the perimeter. The various types can be deployed with other security measures but can also be used unethically to prohibit access.
-
Operations & Management Manage
CISO role in ASM could add runtime security, tokenization
Runtime security and tokenization stand to play a bigger role in attack surface management, a development that could influence security leaders' responsibilities.
Sponsored Sites
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Top DevSecOps certifications and trainings for 2025
DevOps Institute, Practical DevSecOps, EXIN and EC-Council are among the organizations that offer DevSecOps certifications and trainings for cybersecurity professionals.
-
How to perform a cybersecurity risk assessment in 5 steps
-
What is the future of cybersecurity?
-
What is risk management? Importance, benefits and guide
-
-
Problem Solve
How to calculate cybersecurity ROI for CEOs and boards
Calculating and communicating cybersecurity ROI can help persuade top management to invest. Here's how to use meaningful, concrete metrics that resonate with business leaders.
-
Phishing prevention: How to spot, stop and respond to scams
-
CISO playbook for securing AI in the enterprise
-
CISO burnout: How to balance leadership, pressure and sanity
-
-
Manage
CISO role in ASM could add runtime security, tokenization
Runtime security and tokenization stand to play a bigger role in attack surface management, a development that could influence security leaders' responsibilities.
-
How to build a cybersecurity team to maximize business impact
-
AI in risk management: Top benefits and challenges explained
-
How CISOs can prepare for the quantum cybersecurity threat
-
Information Security Basics
-
Get Started
An explanation of firewall types and uses
Firewalls protect networks by stopping malware at the perimeter. The various types can be deployed with other security measures but can also be used unethically to prohibit access.
-
Get Started
CISO
The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program.
-
Get Started
An explanation of data breaches
Data breaches can be intentional or accidental and come in various forms, but all types have the potential to cause considerable harm to individuals and organizations.
Multimedia
-
Get Started
An explanation of firewall types and uses
-
Get Started
An explanation of data breaches
-
Get Started
An explanation of identity and access management
-
News
View All -
Threats and vulnerabilities
News brief: Cyberattack trends signal security arms race
Check out the latest security news from the Informa TechTarget team.
-
Knostic wins 2024 Black Hat Startup Spotlight Competition
During a 'Shark Tank'-like final, each startup's representative spent five minutes detailing their company and product, with an additional five minutes to take questions from eight judges from Omdia, investment firms, and top companies in cyber.
-
Hackers make hay? Smart tractors vulnerable to full takeover
Hackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks to poor security in an aftermarket steering system.
Search Security Definitions
- What is a CISO (chief information security officer)?
- What is biometric authentication?
- What is cloud infrastructure entitlement management (CIEM)?
- What is cybersecurity?
- What is a CISO as a service (CISOaaS)?
- What is post-quantum cryptography? Comprehensive guide
- What is a message authentication code (MAC)? How it works and best practices
- What is SIEM (security information and event management)?