New & Notable
Evaluate
DevSecOps vs. SecDevOps: Which is better for your organization?
How far left should security shift? DevSecOps and SecDevOps both integrate security into DevOps but differ conceptually and practically. Learn which model suits your needs.
Problem Solve
How to detect a deepfake with visual clues and AI tools
Forewarned is forearmed, but too many employees don't realize how sophisticated deepfakes have become. Integrate these deepfake detection tips into security awareness training.
Get Started
Incident response: How to implement a communication plan
Communication is critical to an effective incident response plan. Here are best practices for communication planning and an editable template to help you get started.
5 network security predictions for 2026
What does 2026 have in store for network security? Omdia analyst John Grady shares his top five predictions for the upcoming year.
Trending Topics
-
Data Security & Privacy Evaluate
Top data loss prevention tools for 2026
Discover essential features of enterprise DLP tools and explore six top offerings to protect sensitive data across endpoints, networks, and cloud services.
-
Threats & Vulnerabilities News
News brief: Browser security flaws pose growing risk
Check out the latest security news from the Informa TechTarget team.
-
IAM Get Started
How to plan an IAM program strategy
More than half of organizations lack an IAM strategy. Discover how security leaders can build stakeholder-driven identity management programs that deliver results.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security
5 network security predictions for 2026
What does 2026 have in store for network security? Omdia analyst John Grady shares his top five predictions for the upcoming year.
-
Operations & Management Get Started
Incident response: How to implement a communication plan
Communication is critical to an effective incident response plan. Here are best practices for communication planning and an editable template to help you get started.
Sponsored Sites
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
DevSecOps vs. SecDevOps: Which is better for your organization?
How far left should security shift? DevSecOps and SecDevOps both integrate security into DevOps but differ conceptually and practically. Learn which model suits your needs.
-
Beyond the SBOM: What CISOs should know about CBOMs and HBOMs
-
Top data loss prevention tools for 2026
-
Guide to using digital twins for cybersecurity testing
-
-
Problem Solve
How to detect a deepfake with visual clues and AI tools
Forewarned is forearmed, but too many employees don't realize how sophisticated deepfakes have become. Integrate these deepfake detection tips into security awareness training.
-
How to plan an IAM program strategy
-
Browser detection and response fills gaps in security programs
-
Cybersecurity awareness news brief: What works, what doesn't
-
-
Manage
How to use Core Shell SSH, the PuTTY alternative for macOS
Core Shell is a utility every Mac user who connects to remote resources needs to know. Learn about its exceptional capabilities for managing any number of SSH connections.
-
How to use GPG to encrypt and decrypt files
-
How to use Netcat: Commands and use cases
-
F5-CrowdStrike network security partnership: Is EDR enough?
-
Information Security Basics
-
Get Started
Incident response: How to implement a communication plan
Communication is critical to an effective incident response plan. Here are best practices for communication planning and an editable template to help you get started.
-
Get Started
Guide to cloud container security risks and best practices
Containers are an integral part of a growing number of production environments. But they can become security risks if not managed correctly.
-
Get Started
Beyond the SBOM: What CISOs should know about CBOMs and HBOMs
SBOMs, CBOMs and HBOMS -- oh my! Learn how these bills of materials help manage supply chain risk and assess which of the three your organization needs.
Multimedia
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
Get Started
An explanation of quantum cryptography
-
News
View All -
Threats and vulnerabilities
News brief: Browser security flaws pose growing risk
Check out the latest security news from the Informa TechTarget team.
-
Risk management
News brief: Future of security holds bigger budgets, new threats
Check out the latest security news from the Informa TechTarget team.
-
Threats and vulnerabilities
News brief: RCE flaws persist as top cybersecurity threat
Check out the latest security news from the Informa TechTarget team.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?






