New & Notable
Get Started
What is cybersecurity mesh? Key applications and benefits
Is it time to consider a different approach to security architecture? Cybersecurity mesh might be an effective way to address complex, distributed environments.
Manage
How CISOs can prepare for the quantum cybersecurity threat
CISOs should begin preparing now for quantum computing's impact on cybersecurity. Start with assessments and planning before migrating to post-quantum cryptography standards.
Manage
Prompt injection attacks: From pranks to security threats
Prompt injection attacks manipulate AI systems to bypass security guardrails, enabling data theft and code execution -- yet they lack comprehensive defenses and CVE tracking.
News
News brief: Hafnium, Scattered Spider hackers arrested
Check out the latest security news from the Informa TechTarget team.
Trending Topics
-
Data Security & Privacy Manage
How CISOs can prepare for the quantum cybersecurity threat
CISOs should begin preparing now for quantum computing's impact on cybersecurity. Start with assessments and planning before migrating to post-quantum cryptography standards.
-
Threats & Vulnerabilities Manage
Prompt injection attacks: From pranks to security threats
Prompt injection attacks manipulate AI systems to bypass security guardrails, enabling data theft and code execution -- yet they lack comprehensive defenses and CVE tracking.
-
IAM Evaluate
Top identity security themes at Identiverse 2025
Identiverse 2025 found security pros tackling nonhuman identity risks, preparing for agentic AI challenges and shifting from homegrown to commercial CIAM tools.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Evaluate
Zscaler delivers network, data security tools at Zenith Live
Zscaler has expanded beyond ZTNA with three strategic pillars and aims to challenge traditional security infrastructure.
-
Operations & Management Get Started
What is cybersecurity mesh? Key applications and benefits
Is it time to consider a different approach to security architecture? Cybersecurity mesh might be an effective way to address complex, distributed environments.
Sponsored Sites
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
How to perform a cybersecurity risk assessment in 5 steps
When assessing cybersecurity risk, be sure to consider the scope of the project, your organization's specific assets and leadership's tolerance for risk.
-
What is the future of cybersecurity?
-
What is risk management? Importance, benefits and guide
-
What is cybersecurity transformation? Best practices for success
-
-
Problem Solve
Phishing prevention: How to spot, stop and respond to scams
From email scams to BEC attacks, phishing is one of the biggest fish organizations must fry. Get advice on how to identify, prevent and respond to phishing schemes.
-
CISO burnout: How to balance leadership, pressure and sanity
-
Update Kali Linux to the latest software repository key
-
Shadow AI: How CISOs can regain control in 2025 and beyond
-
-
Manage
AI in risk management: Top benefits and challenges explained
AI can improve the speed and effectiveness of risk management strategies. Here are the potential benefits, use cases and challenges your organization needs to know about.
-
How CISOs can prepare for the quantum cybersecurity threat
-
Prompt injection attacks: From pranks to security threats
-
How to build a cybersecurity culture across your business
-
Information Security Basics
-
Get Started
What is cloud infrastructure entitlement management (CIEM)?
Cloud infrastructure entitlement management (CIEM) is a modern cloud security discipline for managing identities and privileges in cloud environments.
-
Get Started
What is cybersecurity mesh? Key applications and benefits
Is it time to consider a different approach to security architecture? Cybersecurity mesh might be an effective way to address complex, distributed environments.
-
Get Started
What is cybersecurity?
Cybersecurity is the practice of protecting systems, networks and data from digital threats.
Multimedia
-
News
View All -
Threats and vulnerabilities
News brief: Hafnium, Scattered Spider hackers arrested
Check out the latest security news from the Informa TechTarget team.
-
Threats and vulnerabilities
News brief: AI security threats surge as governance lags
Check out the latest security news from the Informa TechTarget team.
-
Threats and vulnerabilities
News brief: LOTL attacks, spoofed sites, malicious repositories
Check out the latest security news from the Informa TechTarget team.
Search Security Definitions
- What is cloud infrastructure entitlement management (CIEM)?
- What is cybersecurity?
- What is a CISO as a service (CISOaaS)?
- What is post-quantum cryptography? Comprehensive guide
- What is a message authentication code (MAC)? How it works and best practices
- What is SIEM (security information and event management)?
- What is the principle of least privilege (POLP)?
- What is quantum key distribution (QKD)?