New & Notable
Evaluate
Real-world AI voice cloning attack: A red teaming case study
Thanks to AI, social engineering campaigns are becoming more effective than ever. In this red team case study, see how voice cloning helped trick a seasoned business user.
Problem Solve
Top web app security vulnerabilities and how to mitigate them
These common web application vulnerabilities have been thorns in the side of IT security for years. They are not new -- and neither are their fixes.
Evaluate
2026 guide to digital forensics tools for enterprises
After a data breach, organizations and law enforcement need to understand what happened. These 10 digital forensics tools collect the key evidence required for an investigation.
Manage
Prepare for the 2026 threatscape with thought leaders' insights
Explore the 2026 cybersecurity landscape, featuring AI-first strategies, human-centric defenses, cloud security and resilience-focused operations.
Trending Topics
-
Data Security & Privacy Evaluate
2026 guide to digital forensics tools for enterprises
After a data breach, organizations and law enforcement need to understand what happened. These 10 digital forensics tools collect the key evidence required for an investigation.
-
Threats & Vulnerabilities Evaluate
Real-world AI voice cloning attack: A red teaming case study
Thanks to AI, social engineering campaigns are becoming more effective than ever. In this red team case study, see how voice cloning helped trick a seasoned business user.
-
IAM Get Started
How to plan an IAM program strategy
More than half of organizations lack an IAM strategy. Discover how security leaders can build stakeholder-driven identity management programs that deliver results.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security
5 network security predictions for 2026
What does 2026 have in store for network security? Omdia analyst John Grady shares his top five predictions for the upcoming year.
-
Operations & Management Get Started
Incident response: How to implement a communication plan
Communication is critical to an effective incident response plan. Here are best practices for communication planning and an editable template to help you get started.
Sponsored Sites
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Security
Leading the Way in Corrections Technology
From creating safer facilities to supporting stronger reentry outcomes, Aventiv, and its family of brands: Securus Technologies, Securus Monitoring and JPay, delivers technology solutions that safely and securely transform corrections environments for everyone.
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Real-world AI voice cloning attack: A red teaming case study
Thanks to AI, social engineering campaigns are becoming more effective than ever. In this red team case study, see how voice cloning helped trick a seasoned business user.
-
2026 guide to digital forensics tools for enterprises
-
DevSecOps vs. SecDevOps: Which is better for your organization?
-
Beyond the SBOM: What CISOs should know about CBOMs and HBOMs
-
-
Problem Solve
Top web app security vulnerabilities and how to mitigate them
These common web application vulnerabilities have been thorns in the side of IT security for years. They are not new -- and neither are their fixes.
-
Prepare for the 2026 threatscape with thought leaders' insights
-
How to detect a deepfake with visual clues and AI tools
-
Security highlights from AWS re:Invent 2025
-
-
Manage
Guide to using digital twins for cybersecurity testing
The digital twin market is growing rapidly as more security teams use the technique to run what-if scenarios to determine if their enterprise networks are vulnerable.
-
How to use Core Shell SSH, the PuTTY alternative for macOS
-
How to use GPG to encrypt and decrypt files
-
How to use Netcat: Commands and use cases
-
Information Security Basics
-
Get Started
Incident response: How to implement a communication plan
Communication is critical to an effective incident response plan. Here are best practices for communication planning and an editable template to help you get started.
-
Get Started
Guide to cloud container security risks and best practices
Containers are an integral part of a growing number of production environments. But they can become security risks if not managed correctly.
-
Get Started
Beyond the SBOM: What CISOs should know about CBOMs and HBOMs
SBOMs, CBOMs and HBOMS -- oh my! Learn how these bills of materials help manage supply chain risk and assess which of the three your organization needs.
Multimedia
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
Get Started
An explanation of quantum cryptography
-
News
View All -
Threats and vulnerabilities
News brief: Browser security flaws pose growing risk
Check out the latest security news from the Informa TechTarget team.
-
Risk management
News brief: Future of security holds bigger budgets, new threats
Check out the latest security news from the Informa TechTarget team.
-
Threats and vulnerabilities
News brief: RCE flaws persist as top cybersecurity threat
Check out the latest security news from the Informa TechTarget team.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?






