Security operations and management
Cybersecurity operations and management are vital to protect enterprises against cyber threats. Learn how to create and manage infosec programs and SOCs, perform incident response and automate security processes. Also read up on security laws and regulations, best practices for CISOs and more.
Top Stories
- 
				Tip
					29 Oct 2025
					
									
										  How to write an information security policy, plus templatesFaced with multiplying security threats and complex IT environments, companies need comprehensive policies that detail how they will protect their systems and respond to attacks. Continue Reading By
- 
				News
					24 Oct 2025
					
									
										  Cybersecurity awareness news brief: What works, what doesn'tCheck out the latest security news from the Informa TechTarget team. Continue Reading By
- 
                Opinion
                24 Oct 2025
                  Cybersecurity Awareness Month: The endpoint security issueDevice diversity and hybrid work models challenge IT teams. New research reveals the gap between managed endpoints and actual security coverage. Continue Reading By- Gabe Knuth, Principal Analyst
- 
                    OmdiaIntelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets. 
 
- 
                Tip
                23 Oct 2025
                  SIEM benefits and features in the modern SOCSecurity information and event management has evolved significantly since it was first introduced 20 years ago. Today's SIEMs offer a wide range of capabilities. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Tip
                22 Oct 2025
                  Top 7 password hygiene tips and best practicesPasswords enable users to access important accounts and data, making them attractive targets to attackers, too. Follow these password hygiene tips to keep your organization safe. Continue Reading By- Sharon Shea, Executive Editor
- Diana Kelley, SecurityCurve
 
- 
                Tutorial
                14 Oct 2025
                  How to use Gophish to fortify security awareness trainingStop phishing attacks before they happen. Discover how Gophish simulates real threats to identify training gaps and strengthen employee awareness. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                News
                10 Oct 2025
                  News brief: AI's cybersecurity risks weigh on business leadersCheck out the latest security news from the Informa TechTarget team. Continue Reading By
- 
                Tip
                09 Oct 2025
                  How CISOs can get out of security debt and why it mattersLike technical debt, security debt accumulates quickly, due to unpatched software, rushed security testing and poor visibility. When the bill comes due, it could mean a breach. Continue Reading By- Ashwin Krishnan, StandOutin90Sec
 
- 
                Tip
                26 Sep 2025
                  7 key types of application security testingModern application development moves at unprecedented speed. Is your security testing keeping pace so that apps are secure when they reach production? Continue Reading 
- 
                Tip
                22 Sep 2025
                  8 best practices for securing RESTful APIsThe REST architectural style helps applications communicate with each other. Be sure RESTful APIs have the protections necessary to keep attackers at bay. Continue Reading By- Ravi Das, ML Tech Inc.
 
- 
                Tutorial
                17 Sep 2025
                  How to use arp-scan to discover network hostsAn arp-scan delivers a fast, focused scan of an organization's local subnet. It is not fancy, but it's an easily controlled method to learn exactly what's connected. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                Feature
                09 Sep 2025
                  Best mobile antivirus software for the enterpriseAntivirus protection is a built-in feature on most desktop computers, but what about mobile devices? Many smartphones need the security tool, but OS differences add complexity. Continue Reading By
- 
                Tip
                04 Sep 2025
                  How to prevent and remove mobile spywareMobile devices can store a lot of data, from sensitive user information to work apps and files. Mobile spyware gives bad actors access to this data and brings major security risks. Continue Reading By- Katie Fenton, Site Editor
 
- 
                Definition
                03 Sep 2025
                  What is information security (infosec)?Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information. Continue Reading By- Kinza Yasar, Technical Writer
- Gavin Wright
- Taina Teravainen
 
- 
                Tip
                25 Aug 2025
                  Red teams and AI: 5 ways to use LLMs for penetration testingRed teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                News
                25 Aug 2025
                  How architectural controls can help fill the AI security gapNCC Group's David Brauchler III shares how foundational controls and threat modeling strategies can help secure agentic AI tools in ways traditional guardrails can't. Continue Reading - 
                Tip
                22 Aug 2025
                  Red vs. blue vs. purple team: What are the differences?Red teams attack, blue teams defend and purple teams facilitate collaboration. Together, they strengthen cybersecurity through simulated exercises and knowledge sharing. Continue Reading By- Sharon Shea, Executive Editor
 
- 
                News
                19 Aug 2025
                  Trump administration cyber cuts eroding private sector’s trust, confidenceA report by Swimlane shows companies are reducing cybersecurity spending and security teams are experiencing increasing pressure. Continue Reading - 
                News
                15 Aug 2025
                  News brief: Rising OT threats put critical infrastructure at riskCheck out the latest security news from the Informa TechTarget team. Continue Reading By
- 
                Tip
                15 Aug 2025
                  How to write a data classification policy, with templateData classification policies help organizations categorize, secure and manage sensitive information while maintaining regulatory compliance and reducing breach risks. Continue Reading By
- 
                News
                13 Aug 2025
                  Black Hat NOC expands AI implementation across security operationsCorelight's James Pope gives Dark Reading an inside look at this year's Black Hat Network Operations Center, detailing security challenges and rising trends -- many related to increased AI use. Continue Reading - 
                Feature
                11 Aug 2025
                  How to use Nmap to scan ports: A complete tutorialNmap is a versatile open source security tool that scans ports to identify vulnerabilities, test firewall rules, inventory networks and troubleshoot connectivity issues. Continue Reading By- Damon Garn, Cogspinner Coaction
 
- 
                News
                11 Aug 2025
                  CISA's relationship with industry needs work to reestablish trust, experts sayCritics say budget cuts, job losses have hurt the agency's ability to coordinate with private industry. Continue Reading - 
                News
                11 Aug 2025
                  CISA officials say agency is moving ahead despite workforce purgeTwo senior officials defended the agency’s progress amid concerns about the effects of mass layoffs and budget cuts. Continue Reading - 
                News
                11 Aug 2025
                  Prime Security wins Black Hat's Startup Spotlight CompetitionSecurity startups of all stripes submitted applications for Black Hat USA's Startup Spotlight. Prime Security won with its AI security architect platform. Continue Reading - 
                Feature
                08 Aug 2025
                  Experts weigh in on securing AI effectivelyUsing AI comes with security risks. Learn what the top attack vectors and privacy threats are, then discover how to mitigate them through proper strategy, monitoring and more. Continue Reading By- Brenda L. Horrigan, Executive Managing Editor
 
- 
                News
                08 Aug 2025
                  NSA partnering with cyber firms to support under-resourced defense contractorsThe spy agency has sought out creative ways to help protect small companies supplying the U.S. military. Continue Reading - 
                News
                06 Aug 2025
                  To raise or not to raise: Bootstrapped founders share their viewsA trio of startup founders -- GreyNoise's Andrew Morris, Thinkst Canary's Haroon Meer, and runZero's HD Moore -- agree that raising venture capital funding can be beneficial, but a company's success depends on how well the product fits customer needs. Continue Reading - 
                News
                06 Aug 2025
                  CISA's relationship with industry needs work to reestablish trust, experts sayCritics say budget cuts, job losses have hurt the agency’s ability to coordinate with private industry. Continue Reading - 
                Video
                05 Aug 2025
                  AI security: Top experts weigh in on the why and howAI is everywhere, so security focus on this new technology is essential. In this podcast episode, three top security experts review the risks and discuss ways to mitigate them. Continue Reading By
- 
                Feature
                05 Aug 2025
                  How to prepare for post-quantum computing securityOne of the biggest fears about quantum computing is its ability to easily break current encryption algorithms. Learn why and how to start making quantum security preparations. Continue Reading By- Kyle Johnson, Technology Editor
 
- 
                News
                04 Aug 2025
                  Dark Reading News Desk turns 10, back at Black Hat USA for 2025Dark Reading's 2025 News Desk marks a decade of Black Hat USA memories. We're making our return with a slate of interviews that help you stay up on the latest research from Black Hat — no trip to Las Vegas required. Continue Reading - 
                Tip
                04 Aug 2025
                  How to recover from a ransomware attack: A complete guideWith a ransomware recovery plan, organizations can act quickly to prevent data loss without descending into chaos. Learn the crucial steps to incorporate into your plan. Continue Reading By- John Burke, Nemertes Research
 
- 
                Tutorial
                01 Aug 2025
                  How to use the John the Ripper password crackerPassword crackers are essential tools in any pen tester's toolbox. This step-by-step tutorial explains how to use John the Ripper, an open source offline password-cracking tool. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                Video
                01 Aug 2025
                  An explanation of purple teamingPurple teaming unites offensive red teams and defensive blue teams to share knowledge, find vulnerabilities and strengthen security through structured frameworks and playbooks. Continue Reading By- Sharon Shea, Executive Editor
- Sabrina Polin, Managing Editor
- Tommy Everson, Assistant Editor
 
- 
                Tip
                25 Jul 2025
                  How to implement security control rationalizationSecurity control rationalization helps CISOs reduce cybersecurity tool sprawl, cut spending and improve efficiency -- all without compromising protection. Continue Reading By- Dave Shackleford, Voodoo Security
 
- 
                Tip
                23 Jul 2025
                  Top DevSecOps certifications and trainings for 2025DevOps Institute, Practical DevSecOps, EXIN and EC-Council are among the organizations that offer DevSecOps certifications and trainings for cybersecurity professionals. Continue Reading 
- 
                Feature
                18 Jul 2025
                  CISO role in ASM could add runtime security, tokenizationRuntime security and tokenization stand to play a bigger role in attack surface management, a development that could influence security leaders' responsibilities. Continue Reading By- John Moore, Industry Editor
 
- 
                Tip
                18 Jul 2025
                  How to build a cybersecurity team to maximize business impactHow CISOs design and build their security teams is as important as the technology they select to safeguard their organizations' digital assets. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                Tip
                17 Jul 2025
                  How to calculate cybersecurity ROI for CEOs and boardsCalculating and communicating cybersecurity ROI can help persuade top management to invest. Here's how to use meaningful, concrete metrics that resonate with business leaders. Continue Reading By- Jerald Murphy, Nemertes Research
- Alissa Irei, Senior Site Editor
 
- 
                News
                17 Jul 2025
                  Knostic wins 2024 Black Hat Startup Spotlight CompetitionDuring a 'Shark Tank'-like final, each startup's representative spent five minutes detailing their company and product, with an additional five minutes to take questions from eight judges from Omdia, investment firms, and top companies in cyber. Continue Reading - 
                News
                17 Jul 2025
                  We've all been wrong: Phishing training doesn't workTeaching employees to detect malicious emails isn't really having an impact. What other options do organizations have? Continue Reading - 
                News
                17 Jul 2025
                  CISA director: Cybersecurity is ‘not an impossible problem’In Jen Easterly’s view, the solution to the industry’s pains lies in secure by design. “We got ourselves into this, we have to get ourselves out,” she said during a media briefing at Black Hat. Continue Reading - 
                News
                17 Jul 2025
                  Black Hat USA 2024 HighlightsCheck out all the highlights from Black Hat USA 2024 at the Mandalay Bay in Las Vegas. Continue Reading - 
                Definition
                15 Jul 2025
                  What is cybersecurity?Cybersecurity is the practice of protecting systems, networks and data from digital threats. Continue Reading By- Kinza Yasar, Technical Writer
- Sharon Shea, Executive Editor
- Alexander S. Gillis, Technical Writer and Editor
 
- 
                Tip
                15 Jul 2025
                  What is cybersecurity mesh? Key applications and benefitsIs it time to consider a different approach to security architecture? Cybersecurity mesh might be an effective way to address complex, distributed environments. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                Tip
                11 Jul 2025
                  How to build a cybersecurity culture across your businessAs a company's cyber-risks evolve, so must its culture. Follow these tips to create a strong cybersecurity culture that helps protect your organization from cyberthreats. Continue Reading By- Jerald Murphy, Nemertes Research
- John Burke, Nemertes Research
 
- 
                Tip
                10 Jul 2025
                  CISO's guide to creating a cybersecurity board reportAn effective cybersecurity board report influences executive decision-making at the highest levels. Learn how to write a report that resonates with corporate directors. Continue Reading By- Jerald Murphy, Nemertes Research
- Alissa Irei, Senior Site Editor
 
- 
                Tip
                10 Jul 2025
                  What CISOs need to know about AI governance frameworksAI offers business benefits but poses legal, ethical and reputational risks. Governance programs manage these risks while ensuring responsible use and regulatory compliance. Continue Reading By- Matthew Smith, Seemless Transition LLC
 
- 
                Tip
                09 Jul 2025
                  Security log management tips and best practicesLearn how to conduct security log management that provides visibility into IT infrastructure activities and traffic, improves troubleshooting and prevents service disruptions. Continue Reading By- Ed Moyle, SecurityCurve
- Michael Cobb
 
- 
                Tip
                09 Jul 2025
                  Incident response tabletop exercises: Guide and templateHave an incident response plan but aren't running incident response tabletop exercises? These simulations are key to knowing if your plan will work during an actual security event. Continue Reading By
- 
                Definition
                09 Jul 2025
                  What is a CISO as a service (CISOaaS)?CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Ben Lutkevich, Site Editor
 
- 
                Feature
                08 Jul 2025
                  How to implement zero trust: 7 expert stepsZero trust means a lot more than determining how users access resources. Successful implementation takes time, commitment and ongoing support. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
- Alissa Irei, Senior Site Editor
 
- 
                Feature
                07 Jul 2025
                  What is the future of cybersecurity?As cyberthreats grow more sophisticated, enterprises face mounting challenges. What does the future of cybersecurity hold, and how can organizations stay ahead? Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Definition
                02 Jul 2025
                  What is SIEM (security information and event management)?SIEM (security information and event management) is software that helps organizations detect, analyze, and respond to security threats by collecting and correlating security event data from across the IT environment in real time. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Linda Rosencrance
 
- 
                Definition
                02 Jul 2025
                  What is the principle of least privilege (POLP)?The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what is strictly required to do their jobs. Continue Reading By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
 
- 
                Definition
                02 Jul 2025
                  What is business continuity software?Business continuity software is an application or suite designed to make business continuity planning/business continuity management (BCP/BCM) processes, metrics and compliance more efficient and accurate. Continue Reading 
- 
                Tip
                02 Jul 2025
                  How to build a cybersecurity strategy and plan in 4 stepsA cybersecurity strategy isn't meant to be perfect, but this high-level plan must be proactive, effective, actively supported and evolving. Here are four key steps to get there. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Tip
                01 Jul 2025
                  Cybersecurity career path: A strategic guide for professionalsThere's no single path for everyone, but knowing what employers look for and following these best practices can help you move up the cybersecurity career ladder. Continue Reading By
- 
                Feature
                30 Jun 2025
                  What is cybersecurity transformation? Best practices for successUnder increasing regulatory pressure and rising cyber threats, executives must prioritize cybersecurity transformation to safeguard assets, enable growth and ensure resilience. Continue Reading By
- 
                Feature
                30 Jun 2025
                  CISO playbook for securing AI in the enterpriseCISOs must partner with executive leadership to adopt a business-aligned AI security strategy that protects the organization while enabling responsible AI adoption. Continue Reading By
- 
                Video
                30 Jun 2025
                  Ransomware: Examples, prevention and mitigating the damageTop cybersecurity experts gathered to discuss the latest threats from ransomware and how organizations, large and small, can prevent or, at least, mitigate an attack. Continue Reading By
- 
                Tip
                30 Jun 2025
                  How CISOs can manage and reduce compliance fatigueCompliance fatigue can undermine security when poorly managed. CISOs can combat it by starting conversations, automating processes and using compliance to drive security initiatives. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                Tip
                30 Jun 2025
                  What is attack surface management? Guide for organizationsAttack surface management can help CISOs and other cybersecurity managers address the growth in the number of potential entry points threat actors might exploit. Continue Reading By- John Moore, Industry Editor
 
- 
                Tip
                30 Jun 2025
                  Cybersecurity outsourcing: Strategies, benefits and risksFor companies battling data breaches and cyberattacks, MSSPs can offer lower costs, better reliability, broader experience and more -- if organizations define their needs well. Continue Reading 
- 
                Tip
                30 Jun 2025
                  10 cybersecurity best practices for organizations in 2025To improve your organization's cybersecurity program, follow these best practices to safeguard your infrastructure and ensure a quick recovery after a breach. Continue Reading By
- 
                Definition
                30 Jun 2025
                  What is vulnerability management? Definition, process and strategyVulnerability management is the process of identifying, assessing, remediating and mitigating security vulnerabilities in software and computer systems. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Sean Michael Kerner
 
- 
                Feature
                30 Jun 2025
                  Enterprise cybersecurity: A strategic guide for CISOsCISOs and others responsible for safeguarding an organization's systems, networks and data need to manage day-to-day threats while also planning strategically for what's ahead. Continue Reading By- Phil Sweeney, Industry Editor
- Craig Stedman, Industry Editor
 
- 
                Feature
                30 Jun 2025
                  Why effective cybersecurity is important for businessesCyberattacks can have serious financial and business consequences for companies, which makes implementing strong cybersecurity protections a critical step. Continue Reading 
- 
                Tip
                27 Jun 2025
                  Cybersecurity in M&A due diligence: Best practices for executivesCompanies wouldn't think of merging with another organization without performing financial or business due diligence. The same is true of cybersecurity. Continue Reading By- Ed Moyle, SecurityCurve
 
- 
                Tip
                27 Jun 2025
                  SBOM formats explained: Guide for enterprisesSBOMs inventory software components to help enhance security by tracking vulnerabilities. Teams have three standard SBOM formats to choose from: CycloneDX, SPDX and SWID tags. Continue Reading By- Ravi Das, ML Tech Inc.
 
- 
                Tip
                27 Jun 2025
                  How to build a cybersecurity RFPCrafting a cybersecurity RFP requires clear goals, precise questions and vendor vetting. Follow these guidelines to streamline the process and meet your company's security needs. Continue Reading 
- 
                Tip
                27 Jun 2025
                  Cybersecurity budget justification: A guide for CISOsThe best way to get a security budget request denied? Present it like a jargon-filled shopping list. Instead, make the case by tying security spending to business outcomes. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                Tip
                27 Jun 2025
                  Cybersecurity skills gap: Why it exists and how to address itThe cybersecurity skills shortage is putting enterprises at risk. Worse, it shows no sign of abating. Here is why it's happening and what employers can do to mitigate the problem. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Tip
                26 Jun 2025
                  Cyber insurance trends 2025: What executives need to knowCyber insurance is essential for protecting an organization from the financial impact of a cyberattack and is a critical part of a risk management strategy. Continue Reading 
- 
                Tip
                26 Jun 2025
                  10 key cybersecurity metrics and KPIs your board wants trackedSecurity leaders need cybersecurity metrics to track their programs and inform decision-makers. These 10 metrics and KPIs provide a good foundation for tracking essential activity. Continue Reading By- Cynthia Brumfield, DCT Associates
 
- 
                Tip
                25 Jun 2025
                  Ransomware threat actors today and how to thwart themTop experts convened on BrightTALK's 'CISO Insights' to discuss 'Ransomware 3.0' -- the current threat and what organizations, large and small, must do to thwart these bad actors. Continue Reading By
- 
                Tip
                25 Jun 2025
                  6 edge monitoring best practices in the cloudWhen it comes to application monitoring, edge workloads are outliers -- literally and metaphorically. Learn what sets them apart and how to implement monitoring best practices. Continue Reading By
- 
                Definition
                25 Jun 2025
                  What is CCTV (closed-circuit television)?CCTV (closed-circuit television) is a video surveillance system in which signals are transmitted to a specific set of monitors and are not publicly broadcast. It is primarily used for security and monitoring. Continue Reading By- Katie Terrell Hanna
- Tayla Holman, Site Editor
- Kristen Lee, News Writer
 
- 
                Tip
                25 Jun 2025
                  10 remote work cybersecurity risks and how to prevent themLarger attack surfaces, limited oversight of data use, AI-driven attacks and vulnerable enterprise technologies are among the security risks faced in remote work environments. Continue Reading 
- 
                Feature
                24 Jun 2025
                  CISO burnout: How to balance leadership, pressure and sanityWith CISO burnout comes increasing cyber incidents and costly leadership turnover. Organizations must invest in support to prevent this growing security risk. Continue Reading By- Rosa Heaton, Content Manager
 
- 
                Tip
                24 Jun 2025
                  Cybersecurity governance: A guide for businesses to followCybersecurity governance is now critical, with NIST CSF 2.0 recently adding it as a dedicated function. Learn why governance is core to an effective cyber strategy. Continue Reading By- Karen Scarfone, Scarfone Cybersecurity
 
- 
                Definition
                24 Jun 2025
                  What is risk avoidance?Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets. Continue Reading 
- 
                Feature
                23 Jun 2025
                  22 free cybersecurity tools you should know aboutCybersecurity products can get pricy, but there are many excellent open source tools to help secure your systems and data. Here's a list of some of the most popular. Continue Reading 
- 
                Definition
                23 Jun 2025
                  What is pure risk?Pure risk refers to risks that are beyond human control and result in a loss or no loss, with no possibility of financial gain. Continue Reading By- Linda Tucci, Industry Editor -- CIO/IT Strategy
- Ben Cole, Executive Editor
 
- 
                Definition
                23 Jun 2025
                  What is residual risk? How is it different from inherent risk?Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made. Continue Reading By- Dave Shackleford, Voodoo Security
- Francesca Sales
 
- 
                Tip
                23 Jun 2025
                  How to choose a cybersecurity vendor: 12 key criteriaChoosing a cybersecurity vendor entails a two-phase approach: shortlisting vendors using clear requirements, then conducting thorough evaluations based on key criteria. Here's how. Continue Reading 
- 
                Feature
                20 Jun 2025
                  What executives must know about nation-state threat actorsNation-state threat actors like Russia, China, Iran and North Korea are targeting critical infrastructure and sensitive data, so executives must prepare to defend against them. Continue Reading By- Madeleine Streets, Senior content manager
 
- 
                Tip
                18 Jun 2025
                  CISO's guide to implementing a cybersecurity maturity modelCISOs must both meet today's challenges and anticipate tomorrow's -- no easy feat. Cybersecurity maturity models help strategically navigate evolving threats, regulations and tech. Continue Reading By- Jerald Murphy, Nemertes Research
 
- 
                Tip
                17 Jun 2025
                  Shadow AI: How CISOs can regain control in 2025 and beyondShadow AI threatens enterprises as employees increasingly use unauthorized AI tools. Discover the risks, governance strategies, and outlook for managing AI in today's workplace. Continue Reading 
- 
                News
                13 Jun 2025
                  News brief: Gartner Security and Risk Management Summit recapCheck out the latest security news from the Informa TechTarget team. Continue Reading By
- 
                Tip
                13 Jun 2025
                  What is cyber risk quantification (CRQ)? How to get it rightCyber risk quantification translates security threats into financial terms, so executives can prioritize risks, justify investments and allocate resources to protect the business. Continue Reading By- Stephen J. Bigelow, Senior Technology Editor
 
- 
                Tip
                13 Jun 2025
                  CISO's guide to building a strong cyber-resilience strategyCyber-resilience strategies that integrate BCDR, incident response and cybersecurity enable CISOs to build frameworks that help their organizations effectively handle cyberattacks. Continue Reading By
- 
                Tip
                13 Jun 2025
                  What a smart contract audit is, and how to conduct oneSmart contracts ensure the integrity of transactions, such as those that initiate key services. A smart contract audit is one way to ensure the programs work as designed. Continue Reading By
- 
                Feature
                12 Jun 2025
                  Cybersecurity risk management: Best practices and frameworksThis proactive approach protects business operations, ensures compliance and preserves reputation through comprehensive security practices. Continue Reading By- Stephen J. Bigelow, Senior Technology Editor
 
- 
                Tip
                12 Jun 2025
                  How to craft an effective AI security policy for enterprisesEnterprises unable to manage AI risks face data breaches, algorithmic bias and adversarial attacks, among other risks. Learn how to implement a comprehensive AI security policy. Continue Reading By
- 
                Tip
                11 Jun 2025
                  Should cybersecurity be part of your digital transformation strategy?Digital transformation offers companies some tantalizing possibilities. But new technologies usher in new vulnerabilities. Cybersecurity needs to play a key role. Continue Reading By- Stephen J. Bigelow, Senior Technology Editor
 
- 
                Definition
                11 Jun 2025
                  What is ransomware as a service (RaaS)?Ransomware as a service (RaaS) is a subscription-based business model that enables threat actors, also called affiliates, to launch ransomware attacks by accessing and using predeveloped ransomware tools. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
- Sean Michael Kerner
 
- 
                Guest Post
                10 Jun 2025
                  How to implement effective app and API security controlsSecurity leaders must implement multilayered strategies combining threat modeling, balanced controls, cloud-first approaches and more to protect apps and APIs from evolving threats. Continue Reading By- William Dupre, Gartner
 
- 
                News
                06 Jun 2025
                  News brief: CISA and partners face budget overhauls, cutsCheck out the latest security news from the Informa TechTarget team. Continue Reading By
- 
                News
                03 Jun 2025
                  HashiCorp Terraform leads IBM, Red Hat integration roadmapHashiCorp and IBM have begun to knit together products such as Terraform and Ansible and divulged some roadmap details, but a few potential product overlaps are still unresolved. Continue Reading By- Beth Pariseau, Senior News Writer
 
- 
                Tip
                02 Jun 2025
                  The DOGE effect on cybersecurity: Efficiency vs. riskThe DOGE effect on security is a complex issue. Pursuit of efficiency might be a legitimate goal, but experts caution it can conflict with cybersecurity defenses. Continue Reading By