New & Notable
Manage
Cybersecurity in M&A due diligence: Best practices for executives
Companies wouldn't think of merging with another organization without performing financial or business due diligence. The same is true of cybersecurity.
Manage
The CISO evolution: From security gatekeeper to strategic leader
Amid accelerating digital transformation and growing regulatory pressure, leading CISOs have emerged from behind the scenes and taken the stage as influential business leaders.
Get Started
SBOM formats explained: Guide for enterprises
SBOMs inventory software components to help enhance security by tracking vulnerabilities. Teams have three standard SBOM formats to choose from: CycloneDX, SPDX and SWID tags.
Get Started
How to build a cybersecurity RFP
Crafting a cybersecurity RFP requires clear goals, precise questions and vendor vetting. Follow these guidelines to streamline the process and meet your company's security needs.
Trending Topics
-
Data Security & Privacy Get Started
Symmetric vs. asymmetric encryption: Understand key differences
Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons.
-
Threats & Vulnerabilities Manage
12 smart contract vulnerabilities and how to mitigate them
Smart contracts execute tasks automatically when specific events occur, and they often handle large data and resource flows. This makes them particularly attractive to attackers.
-
IAM Evaluate
Top identity security themes at Identiverse 2025
Identiverse 2025 found security pros tackling nonhuman identity risks, preparing for agentic AI challenges and shifting from homegrown to commercial CIAM tools.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Evaluate
Zscaler delivers network, data security tools at Zenith Live
Zscaler has expanded beyond ZTNA with three strategic pillars and aims to challenge traditional security infrastructure.
-
Operations & Management Get Started
How to build a cybersecurity RFP
Crafting a cybersecurity RFP requires clear goals, precise questions and vendor vetting. Follow these guidelines to streamline the process and meet your company's security needs.
Sponsored Sites
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
SBOM formats explained: Guide for enterprises
SBOMs inventory software components to help enhance security by tracking vulnerabilities. Teams have three standard SBOM formats to choose from: CycloneDX, SPDX and SWID tags.
-
Cyber insurance trends 2025: What executives need to know
-
Top identity security themes at Identiverse 2025
-
What is a virtual CISO (vCISO)? Does your business need one?
-
-
Problem Solve
Update Kali Linux to the latest software repository key
Kali Linux users might encounter errors when they update or download new software, exposing systems to security threats. A new repository key will eliminate those problems.
-
Shadow AI: How CISOs can regain control in 2025 and beyond
-
How AI threat detection is transforming enterprise cybersecurity
-
What is cyber risk quantification (CRQ)? How to get it right
-
-
Manage
12 DevSecOps tools to secure each step of the SDLC
DevSecOps tools integrate security throughout development. These 12 options enhance workflows from coding to deployment without slowing teams down.
-
Cybersecurity in M&A due diligence: Best practices for executives
-
The CISO evolution: From security gatekeeper to strategic leader
-
10 key cybersecurity metrics and KPIs your board wants tracked
-
Information Security Basics
-
Get Started
What is phishing? Understanding enterprise phishing threats
Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person to trick users into revealing sensitive information.
-
Get Started
SBOM formats explained: Guide for enterprises
SBOMs inventory software components to help enhance security by tracking vulnerabilities. Teams have three standard SBOM formats to choose from: CycloneDX, SPDX and SWID tags.
-
Get Started
What is a virtual CISO (vCISO)? Does your business need one?
The virtual chief information security officer (vCISO) is a C-suite-level security professional or service provider who offers CISO-level expertise on a part-time, remote or contractual basis.
Multimedia
-
News
View All -
Threats and vulnerabilities
News brief: LOTL attacks, spoofed sites, malicious repositories
Check out the latest security news from the Informa TechTarget team.
-
Security operations and management
News brief: Gartner Security and Risk Management Summit recap
Check out the latest security news from the Informa TechTarget team.
-
Security operations and management
News brief: CISA and partners face budget overhauls, cuts
Check out the latest security news from the Informa TechTarget team.
Security Definitions
- What is phishing? Understanding enterprise phishing threats
- What is a virtual CISO (vCISO)? Does your business need one?
- What is a virtual CISO (vCISO)? Does your business need one?
- What is single sign-on (SSO)?
- What is risk avoidance?
- What is pure risk?
- What is residual risk? How is it different from inherent risk?
- What is a SYN flood DoS attack?