New & Notable
News
RSAC 2026 Conference: Key news and industry analysis
Follow SearchSecurity's RSAC 2026 guide for pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
5 top SOC-as-a-service providers and how to evaluate them
SOCaaS simplifies security operations. Compare five providers and key evaluation criteria, including tools, automation, threat intelligence and compliance.
Get Started
Cloud security architecture: Enterprise cloud blueprint for CISOs
As cloud adoption unlocks innovation, it also introduces new risks. A sound cloud security architecture is the blueprint for secure enterprise cloud deployments.
'Missed opportunity': U.S. government’s absence from RSAC Conference leaves stark void
The Trump administration’s decision to not attend the world’s biggest cybersecurity conference sent the wrong message to partners, experts said.
— Cybersecurity DiveTrending Topics
-
Data Security & Privacy Evaluate
Secure file transfer services: Types, tools and selection tips
With so many options, finding the best secure file transfer service can feel daunting. Discover top tools and what you need to make the right decision for your business.
-
Threats & Vulnerabilities News
News brief: Iran cyberattacks escalate, U.S. targets named
Check out the latest security news from the Informa TechTarget team.
-
IAM Manage
CISO's guide to nonhuman identity security
Nonhuman identities are one of the fastest-growing yet least-governed access risks in the enterprise today. Learn how to address them.
-
Analytics & Automation Evaluate
Top UEBA use cases in enterprise cybersecurity
User and entity behavior analytics tools find patterns hidden in an ocean of data, making them critically important in cybersecurity. Explore key UEBA use cases in the enterprise.
-
Network Security Manage
10 enterprise secure remote access best practices
Remote access is a critical necessity in today's work-from-anywhere environment. It's also incredibly risky. But there are ways to protect assets and combat potential attacks.
-
Operations & Management News
RSAC 2026 Conference: Key news and industry analysis
Follow SearchSecurity's RSAC 2026 guide for pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
Sponsored Sites
-
Articlficial Intelligence
AI-Powered Devices: The Fourth Wave of Enterprise Computing
Enterprise computing enters its fourth wave as client devices transform from passive endpoints to intelligent AI systems. Modern laptops, desktops, and mobile devices now feature built-in NPUs and AI accelerators that bring artificial intelligence directly to where work happens. This shift creates distributed intelligence networks where every device anticipates user needs, optimizes workflows, and collaborates autonomously. Organizations gain enterprise AI at scale, transforming employees into human AI agents with unprecedented access to contextual, personalized computing experiences. The future of work is here—powered by intelligent devices that don't just access AI, but embody it.
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Top vulnerability scanning tools for security teams
Use these vulnerability scanning tools to find weaknesses and potential exploits in web applications, IT and cloud infrastructure, IoT devices and more.
-
What AI zero days mean for enterprise cybersecurity
-
Secure file transfer services: Types, tools and selection tips
-
Top UEBA use cases in enterprise cybersecurity
-
-
Problem Solve
Cloud security architecture: Enterprise cloud blueprint for CISOs
As cloud adoption unlocks innovation, it also introduces new risks. A sound cloud security architecture is the blueprint for secure enterprise cloud deployments.
-
How AI caught a malicious North Korean insider at Exabeam
-
Watch your words: Tim Brown's advice for CISOs
-
10 enterprise secure remote access best practices
-
-
Manage
SIEM isn't dead, its place in the SOC is just evolving
Despite the predictions that SIEM is going away, its role is actually evolving. Learn why SIEM tools remain essential to enterprise security operations.
-
How to reduce false positive alerts and increase cybersecurity
-
How to perform a data risk assessment, step by step
-
LLM firewalls emerge as a new AI security layer
-
Information Security Basics
-
Get Started
Cloud security architecture: Enterprise cloud blueprint for CISOs
As cloud adoption unlocks innovation, it also introduces new risks. A sound cloud security architecture is the blueprint for secure enterprise cloud deployments.
-
Get Started
Watch your words: Tim Brown's advice for CISOs
During RSAC 2026, Tim Brown discussed the SolarWinds breach, his SEC indictment and the critical need for communication policies.
-
Get Started
Boost SOC efficiency with Python security automation
Resource-strapped SOCs need better incident response, threat hunting and report generation. Explore how automating tasks with Python makes life easier for security teams.
Multimedia
-
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
News
View All -
Threats and vulnerabilities
News brief: Iran cyberattacks escalate, U.S. targets named
Check out the latest security news from the Informa TechTarget team.
-
'Missed opportunity': U.S. government’s absence from RSAC Conference leaves stark void
The Trump administration’s decision to not attend the world’s biggest cybersecurity conference sent the wrong message to partners, experts said.
-
Geopolitics, AI and cybersecurity: Insights from RSAC 2026
AI-driven threats, global leadership shifts and the future of cybersecurity in a rapidly evolving landscape were among the discussions at RSAC 2026 Conference.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?






