New & Notable
News
How organizations can use mistakes to level up their security programs
Organizations repeatedly expose ports, reuse passwords, and skip patches, creating security gaps that attackers exploit for breaches. An industry veteran outlines ways to fix these common mistakes.
— Dark ReadingNews
Automotive cybersecurity threats grow in era of connected, autonomous vehicles
More than a decade since the 2015 Jeep hack, the cybersecurity of vehicles remains of the utmost importance.
— Dark ReadingNews brief: U.S. absence at RSAC sparks leadership concerns
Check out the latest security news from the Informa TechTarget team.
News
RSAC 2026 Conference: Key news and industry analysis
Follow SearchSecurity's RSAC 2026 guide for pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
Trending Topics
-
Data Security & Privacy Evaluate
Secure file transfer services: Types, tools and selection tips
With so many options, finding the best secure file transfer service can feel daunting. Discover top tools and what you need to make the right decision for your business.
-
Threats & Vulnerabilities
News brief: U.S. absence at RSAC sparks leadership concerns
Check out the latest security news from the Informa TechTarget team.
-
IAM Manage
CISO's guide to nonhuman identity security
Nonhuman identities are one of the fastest-growing yet least-governed access risks in the enterprise today. Learn how to address them.
-
Analytics & Automation Evaluate
Top UEBA use cases in enterprise cybersecurity
User and entity behavior analytics tools find patterns hidden in an ocean of data, making them critically important in cybersecurity. Explore key UEBA use cases in the enterprise.
-
Network Security Manage
10 enterprise secure remote access best practices
Remote access is a critical necessity in today's work-from-anywhere environment. It's also incredibly risky. But there are ways to protect assets and combat potential attacks.
-
Operations & Management Get Started
Watch your words: Tim Brown's advice for CISOs
During RSAC 2026, Tim Brown discussed the SolarWinds breach, his SEC indictment and the critical need for communication policies.
Sponsored Sites
-
AI
Trusted platforms for every workload
Modern IT is hybrid IT. Your enterprise has infrastructure, platforms, apps, and tools from different vendors. Proprietary tools don’t talk to each other. And apps cross clouds slowly, weighed down by data. And now, managing the growing complexity of AI/ML workloads adds another layer of challenge.You need advancements in infrastructure, management, and development that bring your clouds together. Connect with us to learn how together, Red Hat® and Amazon Web Services (AWS) give you the tools and technologies to adapt to market demands. Scale infrastructure, expand opportunities, and innovate with AI in line with your organization’s needs and business goals.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Top vulnerability scanning tools for security teams
Use these vulnerability scanning tools to find weaknesses and potential exploits in web applications, IT and cloud infrastructure, IoT devices and more.
-
What AI zero days mean for enterprise cybersecurity
-
Secure file transfer services: Types, tools and selection tips
-
Top UEBA use cases in enterprise cybersecurity
-
-
Problem Solve
Watch your words: Tim Brown's advice for CISOs
During RSAC 2026, Tim Brown discussed the SolarWinds breach, his SEC indictment and the critical need for communication policies.
-
10 enterprise secure remote access best practices
-
Boost SOC efficiency with Python security automation
-
Lessons in incident response from the Olympics, World Cup
-
-
Manage
How to reduce false positive alerts and increase cybersecurity
False positives in cybersecurity detection tools drain resources and distract from real threats. Once CISOs understand the root causes of false positives, they can implement strategies to reduce them.
-
How to perform a data risk assessment, step by step
-
LLM firewalls emerge as a new AI security layer
-
How to build an incident response plan, with examples, template
-
Information Security Basics
-
Get Started
Watch your words: Tim Brown's advice for CISOs
During RSAC 2026, Tim Brown discussed the SolarWinds breach, his SEC indictment and the critical need for communication policies.
-
Get Started
Boost SOC efficiency with Python security automation
Resource-strapped SOCs need better incident response, threat hunting and report generation. Explore how automating tasks with Python makes life easier for security teams.
-
Get Started
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan..
Multimedia
-
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
News
View All -
How organizations can use mistakes to level up their security programs
Organizations repeatedly expose ports, reuse passwords, and skip patches, creating security gaps that attackers exploit for breaches. An industry veteran outlines ways to fix these common mistakes.
-
Automotive cybersecurity threats grow in era of connected, autonomous vehicles
More than a decade since the 2015 Jeep hack, the cybersecurity of vehicles remains of the utmost importance.
-
Threats and vulnerabilities
News brief: U.S. absence at RSAC sparks leadership concerns
Check out the latest security news from the Informa TechTarget team.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?






