New & Notable
Problem Solve
Enhance security audits with Nmap and NSE scripts
The Nmap Scripting Engine feature enables security admins to automate scans, detect vulnerabilities and validate network security settings.
News
News brief: Nation-state hackers active on the global stage
Check out the latest security news from the Informa TechTarget team.
Get Started
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan..
Get Started
MLSecOps: Bridging security and AI development processes
MLSecOps ensures AI security by automating controls, fostering collaboration and addressing vulnerabilities early in the development lifecycle.
Trending Topics
-
Data Security & Privacy Evaluate
2026 guide to digital forensics tools for enterprises
After a data breach, organizations and law enforcement need to understand what happened. These 10 digital forensics tools collect the key evidence required for an investigation.
-
Threats & Vulnerabilities News
Ransomware hammers manufacturing sector
Ransomware attacks on manufacturers are skyrocketing. For cybercriminals, the sector sits at a sweet spot on the risk-reward continuum.
-
IAM Manage
CISO's guide to nonhuman identity security
Nonhuman identities are one of the fastest-growing yet least-governed access risks in the enterprise today. Learn how to address them.
-
Analytics & Automation Get Started
Use the CIA triad to shape security automation use cases
Automating IT security with the CIA triad framework helps improve scalability, reduce misconfigurations and enhance threat detection and remediation.
-
Network Security Problem Solve
Enhance security audits with Nmap and NSE scripts
The Nmap Scripting Engine feature enables security admins to automate scans, detect vulnerabilities and validate network security settings.
-
Operations & Management Get Started
MLSecOps: Bridging security and AI development processes
MLSecOps ensures AI security by automating controls, fostering collaboration and addressing vulnerabilities early in the development lifecycle.
Sponsored Sites
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Articlficial Intelligence
AI-Powered Devices: The Fourth Wave of Enterprise Computing
Enterprise computing enters its fourth wave as client devices transform from passive endpoints to intelligent AI systems. Modern laptops, desktops, and mobile devices now feature built-in NPUs and AI accelerators that bring artificial intelligence directly to where work happens. This shift creates distributed intelligence networks where every device anticipates user needs, optimizes workflows, and collaborates autonomously. Organizations gain enterprise AI at scale, transforming employees into human AI agents with unprecedented access to contextual, personalized computing experiences. The future of work is here—powered by intelligent devices that don't just access AI, but embody it.
-
Security
Leading the Way in Corrections Technology
From creating safer facilities to supporting stronger reentry outcomes, Aventiv, and its family of brands: Securus Technologies, Securus Monitoring and JPay, delivers technology solutions that safely and securely transform corrections environments for everyone.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
How to evaluate NGFW products to strengthen cybersecurity
Next-generation firewalls are critical tools in today's evolving threat landscape. Learn how to evaluate and select an NGFW that will bolster your company's cybersecurity posture.
-
Top 10 ransomware targets by industry
-
Top incident response certifications to consider in 2026
-
Why organizations need cloud attack surface management
-
-
Problem Solve
Enhance security audits with Nmap and NSE scripts
The Nmap Scripting Engine feature enables security admins to automate scans, detect vulnerabilities and validate network security settings.
-
CISO's guide: How to prevent business email compromise
-
ASU's CISO: AI craze is a strategic opportunity for security
-
How CISOs can balance AI innovation and security risk
-
-
Manage
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan..
-
MLSecOps: Bridging security and AI development processes
-
How to build an incident response framework
-
A leader's guide to integrating EDR, SIEM and SOAR
-
Information Security Basics
-
Get Started
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan..
-
Get Started
MLSecOps: Bridging security and AI development processes
MLSecOps ensures AI security by automating controls, fostering collaboration and addressing vulnerabilities early in the development lifecycle.
-
Get Started
A leader's guide to integrating EDR, SIEM and SOAR
Understand the architecture, implementation, and maintenance of EDR, SIEM, and SOAR tools to optimize security workflows and ensure resilience.
Multimedia
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
Get Started
An explanation of quantum cryptography
-
News
View All -
Threats and vulnerabilities
Ransomware hammers manufacturing sector
Ransomware attacks on manufacturers are skyrocketing. For cybercriminals, the sector sits at a sweet spot on the risk-reward continuum.
-
Threats and vulnerabilities
News brief: Nation-state hackers active on the global stage
Check out the latest security news from the Informa TechTarget team.
-
Threats and vulnerabilities
News brief: 6 Microsoft zero days and a warning from CISA
Check out the latest security news from the Informa TechTarget team.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?






