New & Notable
CISO's guide to demonstrating cyber resilience
Elevating cybersecurity to a state of resilience requires a security team to adapt and strengthen defenses. The result should be that a future attack is less likely to succeed.
Manage
CISO's guide: How to prevent business email compromise
Business email compromise feeds on professional email norms -- and exploits emotions such as fear or urgency. Learn what BEC is, how it works and how to prevent it.
News
News brief: 6 Microsoft zero days and a warning from CISA
Check out the latest security news from the Informa TechTarget team.
Problem Solve
ASU's CISO: AI craze is a strategic opportunity for security
All eyes in the C-suite are on AI, and Arizona State University's CISO is seizing the moment. Learn how AI is solving problems that cybersecurity has been flagging for years.
Trending Topics
-
Data Security & Privacy Evaluate
2026 guide to digital forensics tools for enterprises
After a data breach, organizations and law enforcement need to understand what happened. These 10 digital forensics tools collect the key evidence required for an investigation.
-
Threats & Vulnerabilities News
News brief: 6 Microsoft zero days and a warning from CISA
Check out the latest security news from the Informa TechTarget team.
-
IAM Manage
CISO's guide to nonhuman identity security
Nonhuman identities are one of the fastest-growing yet least-governed access risks in the enterprise today. Learn how to address them.
-
Analytics & Automation Get Started
Use the CIA triad to shape security automation use cases
Automating IT security with the CIA triad framework helps improve scalability, reduce misconfigurations and enhance threat detection and remediation.
-
Network Security Evaluate
How to evaluate NGFW products to strengthen cybersecurity
Next-generation firewalls are critical tools in today's evolving threat landscape. Learn how to evaluate and select an NGFW that will bolster your company's cybersecurity posture.
-
Operations & Management
CISO's guide to demonstrating cyber resilience
Elevating cybersecurity to a state of resilience requires a security team to adapt and strengthen defenses. The result should be that a future attack is less likely to succeed.
Sponsored Sites
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
How to evaluate NGFW products to strengthen cybersecurity
Next-generation firewalls are critical tools in today's evolving threat landscape. Learn how to evaluate and select an NGFW that will bolster your company's cybersecurity posture.
-
Top 10 ransomware targets by industry
-
Top incident response certifications to consider in 2026
-
Why organizations need cloud attack surface management
-
-
Problem Solve
CISO's guide: How to prevent business email compromise
Business email compromise feeds on professional email norms -- and exploits emotions such as fear or urgency. Learn what BEC is, how it works and how to prevent it.
-
ASU's CISO: AI craze is a strategic opportunity for security
-
How CISOs can balance AI innovation and security risk
-
Secure MCP servers to safeguard AI and corporate data
-
-
Manage
How to build an incident response framework
Frameworks provide the structure for an effective incident response program. Here's where to turn for guidance on what to include.
-
A leader's guide to integrating EDR, SIEM and SOAR
-
10 types of information security threats for IT teams
-
10 must-have security technologies in 2026
-
Information Security Basics
-
Get Started
A leader's guide to integrating EDR, SIEM and SOAR
Understand the architecture, implementation, and maintenance of EDR, SIEM, and SOAR tools to optimize security workflows and ensure resilience.
-
Get Started
Why organizations need cloud attack surface management
Cloud environments constantly change, expanding attack surfaces beyond traditional tools. Cloud ASM delivers continuous visibility to identify exposures, misconfigurations and risk.
-
Get Started
10 cybersecurity trends to watch in 2026
As cyber-risks escalate in 2026, CISOs face AI-powered attacks, OT vulnerabilities and quantum computing threats. Read more on the key trends shaping security.
Multimedia
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
Get Started
An explanation of quantum cryptography
-
News
View All -
Threats and vulnerabilities
News brief: 6 Microsoft zero days and a warning from CISA
Check out the latest security news from the Informa TechTarget team.
-
Threats and vulnerabilities
News brief: Ransomware trends show new twists to old game
Check out the latest security news from the Informa TechTarget team.
-
Threats and vulnerabilities
News brief: Patch critical and high-severity vulnerabilities now
Check out the latest security news from the Informa TechTarget team.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?






