New & Notable
News
News brief: AI woes continue for security leaders
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
Problem Solve
Deepfake era demands proof-based security, not just awareness
Deepfakes are reshaping social engineering attacks, and traditional security awareness training is falling short. Some experts say it's time for proof-based verification policies.
Is SOAR dead or alive? Sort of
Orchestration and automation capabilities remain critical elements in effective cyber defense. Just don't expect to hear much about SOAR anymore.
Manage
The push for digital sovereignty: What CISOs need to know
Digital sovereignty is reshaping global IT strategies and governments are prioritizing local tech to reduce foreign dependencies. Find out what this means for your organization.
Trending Topics
-
Data Security & Privacy Evaluate
Secure file transfer services: Types, tools and selection tips
With so many options, finding the best secure file transfer service can feel daunting. Discover top tools and what you need to make the right decision for your business.
-
Threats & Vulnerabilities
Cybersecurity in the age of AI means bigger, faster threats
Cybersecurity professionals at SecureWorld Boston had a lot to say about identity management, AI threats and the challenges they face in achieving real-time visibility.
-
IAM Get Started
How to roll out an enterprise passkey deployment
Passkey security sidesteps many of the end-user and cybersecurity issues that plague traditional passwords. Learn how to successfully deploy passkeys in your organization.
-
Analytics & Automation News
At RSAC 2026, AI optimism and anxiety -- and an MIA U.S. government
Depending on whom you ask, AI could mean the end of the world as we know it, or the beginning of a new era of ease and enlightenment in the SOC. Learn more in this video discussion.
-
Network Security Evaluate
5 top SIEM use cases in the enterprise
In the age of AI everything, SIEM isn't exactly flashy -- but it still matters. Explore top SIEM use cases that span the enterprise, from cybersecurity to IT ops.
-
Operations & Management News
News brief: AI woes continue for security leaders
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
Sponsored Sites
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
5 top SIEM use cases in the enterprise
In the age of AI everything, SIEM isn't exactly flashy -- but it still matters. Explore top SIEM use cases that span the enterprise, from cybersecurity to IT ops.
-
CISO checklist: Cybersecurity platform or marketing ploy?
-
Next-generation firewall buyer's guide for CISOs
-
RSAC 2026 recap: AI security and network security trends
-
-
Problem Solve
Deepfake era demands proof-based security, not just awareness
Deepfakes are reshaping social engineering attacks, and traditional security awareness training is falling short. Some experts say it's time for proof-based verification policies.
-
The push for digital sovereignty: What CISOs need to know
-
Beyond awareness: Human risk management metrics for CISOs
-
How to improve the SOC analyst experience -- and why it matters
-
-
Manage
Inside the SOC that secured RSAC 2026 Conference
Take a behind-the-scenes look at the technology and teamwork that went into creating the security operations center that protected attendees, vendors and staff at RSAC 2026.
-
How to roll out an enterprise passkey deployment
-
8 best practices for a bulletproof IAM strategy
-
Agentic AI's role in amplifying and creating insider risks
-
Information Security Basics
-
Get Started
Beyond awareness: Human risk management metrics for CISOs
Traditional security training isn't keeping threat actors out. As employee awareness programs fall short, Forrester Research suggests a better approach.
-
Get Started
How to roll out an enterprise passkey deployment
Passkey security sidesteps many of the end-user and cybersecurity issues that plague traditional passwords. Learn how to successfully deploy passkeys in your organization.
-
Get Started
Next-generation firewall buyer's guide for CISOs
NGFWs are crucial tools for modern security operations, but CISOs need to understand the often complex deployment, maintenance and budgeting implications.
Multimedia
-
-
-
Get Started
An explanation of quantum key distribution
-
News
View All -
Security operations and management
News brief: AI woes continue for security leaders
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
-
Security operations and management
News brief: Microsoft security vulnerabilities revealed
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
-
Threats and vulnerabilities
News brief: Iranian cyberattacks target U.S. water, energy
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?





