New & Notable
Manage
Identity security for AI agents: The proliferation challenge
Identity teams can accelerate AI adoption with strong security foundations. But managing nondeterministic AI agents is different from securing human identities and traditional NHIs.
Manage
Taking care of business: The CISO's role in a cyber crisis
CISOs have a broad range of responsibilities. But when a crisis occurs, they become the de facto leader, entrusted with both technical and business outcomes.
Manage
What CISOs need to know about AI audit logs
AI audit logs are rapidly becoming essential tools for enterprise CISOs. Here's what cybersecurity leaders need to track to mitigate risks.
Get Started
SOC vs. MDR: What CISOs need to consider
Security operations centers and managed detection and response providers differ in how they manage threats. What's the best way to choose between a SOC and MDR service?
Trending Topics
-
Data Security & Privacy Manage
Data after the breach: Economics of the dark web
A breach is just the beginning. Once extracted, data moves through a sophisticated supply chain. Peek inside the dark web economy that turns stolen credentials into billions of dollars in profit.
-
Threats & Vulnerabilities News
Verizon 2026 DBIR: 6 key takeaways for CISOs
The 2026 DBIR -- practically required reading for CISOs -- identifies critical enterprise security trends, from exploit-driven breaches to shadow AI dangers and third-party risks.
-
IAM Manage
Identity security for AI agents: The proliferation challenge
Identity teams can accelerate AI adoption with strong security foundations. But managing nondeterministic AI agents is different from securing human identities and traditional NHIs.
-
Analytics & Automation Evaluate
What every CISO should consider before a SIEM migration
Before starting a SIEM migration, the security team must identify the data, rules, workflows and policies they need to transition to the new tool or service. Here's how to get started.
-
Network Security Evaluate
The enterprise case for zero trust
When applied correctly, zero trust can minimize an organization's attack surface. Experts weigh in on the best use cases where zero trust can deliver results.
-
Operations & Management Manage
Taking care of business: The CISO's role in a cyber crisis
CISOs have a broad range of responsibilities. But when a crisis occurs, they become the de facto leader, entrusted with both technical and business outcomes.
Sponsored Sites
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
AI
Trusted platforms for every workload
Modern IT is hybrid IT. Your enterprise has infrastructure, platforms, apps, and tools from different vendors. Proprietary tools don’t talk to each other. And apps cross clouds slowly, weighed down by data. And now, managing the growing complexity of AI/ML workloads adds another layer of challenge.You need advancements in infrastructure, management, and development that bring your clouds together. Connect with us to learn how together, Red Hat® and Amazon Web Services (AWS) give you the tools and technologies to adapt to market demands. Scale infrastructure, expand opportunities, and innovate with AI in line with your organization’s needs and business goals.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
SOC vs. MDR: What CISOs need to consider
Security operations centers and managed detection and response providers differ in how they manage threats. What's the best way to choose between a SOC and MDR service?
-
How to implement zero trust for AI
-
The breakup: Why CISOs are decoupling data from their SIEMs
-
How to construct an effective security controls evaluation
-
-
Problem Solve
Identity security for AI agents: The proliferation challenge
Identity teams can accelerate AI adoption with strong security foundations. But managing nondeterministic AI agents is different from securing human identities and traditional NHIs.
-
Taking care of business: The CISO's role in a cyber crisis
-
Transform SIEM rules with behavior-based threat detection
-
CISO's guide: How to test an incident response plan
-
-
Manage
What CISOs need to know about AI audit logs
AI audit logs are rapidly becoming essential tools for enterprise CISOs. Here's what cybersecurity leaders need to track to mitigate risks.
-
Claude Mythos changes the AI security threat matrix
-
What every CISO should consider before a SIEM migration
-
CISO's guide to centralized vs. federated security models
-
Information Security Basics
-
Get Started
SOC vs. MDR: What CISOs need to consider
Security operations centers and managed detection and response providers differ in how they manage threats. What's the best way to choose between a SOC and MDR service?
-
Get Started
CISO's guide: How to test an incident response plan
Creating an incident response plan is only the beginning. Regular testing will help ensure it doesn't fall apart during a real cybersecurity event.
-
Get Started
Buyer's guide for CISOs: Cloud security posture management
Cloud security posture management is a critical component of cloud defense strategy. Need help choosing a CSPM platform? This guide lists key features and platforms to consider.
Multimedia
-
News
View All -
Threats and vulnerabilities
Verizon 2026 DBIR: 6 key takeaways for CISOs
The 2026 DBIR -- practically required reading for CISOs -- identifies critical enterprise security trends, from exploit-driven breaches to shadow AI dangers and third-party risks.
-
Risk management
Instructure cyberattack reignites ransom payment debate
Instructure struck a deal to recover its stolen data -- likely paying a hefty ransom. For CISOs, deciding whether to negotiate with cybercriminals should come down to business risk.
-
Threats and vulnerabilities
News brief: Security worries and warnings as AI use expands
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?







