New & Notable
News
The case for why better breach transparency matters
It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse -- not disclose the incident at all.
— Dark ReadingNews
AI agent overload: How to solve the workload identity crisis
Workloads keep getting more complicated and organizations are struggling to keep up. So what's the play?
— Dark ReadingNews
RSAC 2026 Conference: Key news and industry analysis
Follow SearchSecurity's RSAC 2025 guide for pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
News brief: Strikes on Iran put cybersecurity teams on alert
Check out the latest security news from the Informa TechTarget team.
Trending Topics
-
Data Security & Privacy Manage
How to perform a data risk assessment, step by step
Data risk assessments review how an organization protects its sensitive data and identify necessary improvements by revealing potential vulnerabilities, threats and other risks.
-
Threats & Vulnerabilities
News brief: Strikes on Iran put cybersecurity teams on alert
Check out the latest security news from the Informa TechTarget team.
-
IAM Manage
CISO's guide to nonhuman identity security
Nonhuman identities are one of the fastest-growing yet least-governed access risks in the enterprise today. Learn how to address them.
-
Analytics & Automation Manage
How to reduce false positive alerts and increase cybersecurity
False positives in cybersecurity detection tools drain resources and distract from real threats. Once CISOs understand the root causes of false positives, they can implement strategies to reduce them.
-
Network Security Evaluate
Comparison of 5 top next-generation firewall vendors
Top NGFWs excel in reliability, scalability, and advanced features such as post-quantum cryptography, but users face steep learning curves and complex licensing.
-
Operations & Management News
RSAC 2026 Conference: Key news and industry analysis
Follow SearchSecurity's RSAC 2025 guide for pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
Sponsored Sites
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Articlficial Intelligence
AI-Powered Devices: The Fourth Wave of Enterprise Computing
Enterprise computing enters its fourth wave as client devices transform from passive endpoints to intelligent AI systems. Modern laptops, desktops, and mobile devices now feature built-in NPUs and AI accelerators that bring artificial intelligence directly to where work happens. This shift creates distributed intelligence networks where every device anticipates user needs, optimizes workflows, and collaborates autonomously. Organizations gain enterprise AI at scale, transforming employees into human AI agents with unprecedented access to contextual, personalized computing experiences. The future of work is here—powered by intelligent devices that don't just access AI, but embody it.
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Comparison of 5 top next-generation firewall vendors
Top NGFWs excel in reliability, scalability, and advanced features such as post-quantum cryptography, but users face steep learning curves and complex licensing.
-
CISO decisions: Weighing costs, benefits of dark web monitoring
-
LLM firewalls emerge as a new AI security layer
-
Top threat modeling tools, plus features to look for
-
-
Problem Solve
How to reduce false positive alerts and increase cybersecurity
False positives in cybersecurity detection tools drain resources and distract from real threats. Once CISOs understand the root causes of false positives, they can implement strategies to reduce them.
-
Enhance security audits with Nmap and NSE scripts
-
CISO's guide: How to prevent business email compromise
-
ASU's CISO: AI craze is a strategic opportunity for security
-
-
Manage
How to perform a data risk assessment, step by step
Data risk assessments review how an organization protects its sensitive data and identify necessary improvements by revealing potential vulnerabilities, threats and other risks.
-
How to build an incident response plan, with examples, template
-
MLSecOps: Bridging security and AI development processes
-
How to build an incident response framework
-
Information Security Basics
-
Get Started
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan..
-
Get Started
MLSecOps: Bridging security and AI development processes
MLSecOps ensures AI security by automating controls, fostering collaboration and addressing vulnerabilities early in the development lifecycle.
-
Get Started
A leader's guide to integrating EDR, SIEM and SOAR
Understand the architecture, implementation, and maintenance of EDR, SIEM, and SOAR tools to optimize security workflows and ensure resilience.
Multimedia
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
Get Started
An explanation of quantum cryptography
-
News
View All -
Enigma cipher device still holds secrets for cyber pros
The Nazi relic's history is riddled with resilience errors, and those lessons still apply to defending against modern cyberthreats.
-
The case for why better breach transparency matters
It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse -- not disclose the incident at all.
-
AI agent overload: How to solve the workload identity crisis
Workloads keep getting more complicated and organizations are struggling to keep up. So what's the play?
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?






