New & Notable
Evaluate
Secure file transfer services: Types, tools and selection tips
With so many options, finding the best secure file transfer service can feel daunting. Discover top tools and what you need to make the right decision for your business.
Evaluate
Top UEBA use cases in enterprise cybersecurity
User and entity behavior analytics tools find patterns hidden in an ocean of data, making them critically important in cybersecurity. Explore key UEBA use cases in the enterprise.
Get Started
Boost SOC efficiency with Python security automation
Resource-strapped SOCs need better incident response, threat hunting and report generation. Explore how automating tasks with Python makes life easier for security teams.
Problem Solve
Lessons in incident response from the Olympics, World Cup
Cybersecurity lessons from global sports events show that preparation, defense and quick recovery are essential to besting adversaries.
Trending Topics
-
Data Security & Privacy Evaluate
Secure file transfer services: Types, tools and selection tips
With so many options, finding the best secure file transfer service can feel daunting. Discover top tools and what you need to make the right decision for your business.
-
Threats & Vulnerabilities Evaluate
What AI zero days mean for enterprise cybersecurity
AI's ability to find and exploit high-severity zero days at speed and scale presents both attackers and defenders with game-changing opportunity. Here's what CISOs should know.
-
IAM Manage
CISO's guide to nonhuman identity security
Nonhuman identities are one of the fastest-growing yet least-governed access risks in the enterprise today. Learn how to address them.
-
Analytics & Automation Evaluate
Top UEBA use cases in enterprise cybersecurity
User and entity behavior analytics tools find patterns hidden in an ocean of data, making them critically important in cybersecurity. Explore key UEBA use cases in the enterprise.
-
Network Security Evaluate
Comparison of 5 top next-generation firewall vendors
Top NGFWs excel in reliability, scalability, and advanced features such as post-quantum cryptography, but users face steep learning curves and complex licensing.
-
Operations & Management
Calculating the ROI of AI in cybersecurity
Investing in AI tools can benefit an organization's security posture. Understanding and quantifying those improvements, however, poses a real challenge.
Sponsored Sites
-
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
-
AI
Trusted platforms for every workload
Modern IT is hybrid IT. Your enterprise has infrastructure, platforms, apps, and tools from different vendors. Proprietary tools don’t talk to each other. And apps cross clouds slowly, weighed down by data. And now, managing the growing complexity of AI/ML workloads adds another layer of challenge.You need advancements in infrastructure, management, and development that bring your clouds together. Connect with us to learn how together, Red Hat® and Amazon Web Services (AWS) give you the tools and technologies to adapt to market demands. Scale infrastructure, expand opportunities, and innovate with AI in line with your organization’s needs and business goals.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
What AI zero days mean for enterprise cybersecurity
AI's ability to find and exploit high-severity zero days at speed and scale presents both attackers and defenders with game-changing opportunity. Here's what CISOs should know.
-
Secure file transfer services: Types, tools and selection tips
-
Top UEBA use cases in enterprise cybersecurity
-
Streamline SecOps with SOAR workflows and playbooks
-
-
Problem Solve
Boost SOC efficiency with Python security automation
Resource-strapped SOCs need better incident response, threat hunting and report generation. Explore how automating tasks with Python makes life easier for security teams.
-
Lessons in incident response from the Olympics, World Cup
-
How to reduce false positive alerts and increase cybersecurity
-
LLM firewalls emerge as a new AI security layer
-
-
Manage
How to perform a data risk assessment, step by step
Data risk assessments review how an organization protects its sensitive data and identify necessary improvements by revealing potential vulnerabilities, threats and other risks.
-
How to build an incident response plan, with examples, template
-
MLSecOps: Bridging security and AI development processes
-
How to evaluate NGFW products to strengthen cybersecurity
-
Information Security Basics
-
Get Started
Boost SOC efficiency with Python security automation
Resource-strapped SOCs need better incident response, threat hunting and report generation. Explore how automating tasks with Python makes life easier for security teams.
-
Get Started
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan..
-
Get Started
MLSecOps: Bridging security and AI development processes
MLSecOps ensures AI security by automating controls, fostering collaboration and addressing vulnerabilities early in the development lifecycle.
Multimedia
-
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
News
View All -
Threats and vulnerabilities
News brief: Risk of Iran-backed cyberattacks rising in U.S.
Check out the latest security news from the Informa TechTarget team.
-
OT attacks get scary with 'living-off-the-plant' techniques
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
-
Top cyber industry defenses spike CO2 emissions
Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?






