New & Notable
Cybersecurity in the age of AI means bigger, faster threats
Cybersecurity professionals at SecureWorld Boston had a lot to say about identity management, AI threats and the challenges they face in achieving real-time visibility.
News
At RSAC 2026, AI optimism and anxiety -- and an MIA U.S. government
Depending on whom you ask, AI could mean the end of the world as we know it, or the beginning of a new era of ease and enlightenment in the SOC. Learn more in this video discussion.
News brief: Microsoft security vulnerabilities revealed
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
News
RSAC 2026 Conference: Key news and industry analysis
Check out SearchSecurity's RSAC 2026 guide for reports on notable presentations and breaking news at the world's biggest infosec event.
Trending Topics
-
Data Security & Privacy Evaluate
Secure file transfer services: Types, tools and selection tips
With so many options, finding the best secure file transfer service can feel daunting. Discover top tools and what you need to make the right decision for your business.
-
Threats & Vulnerabilities
Cybersecurity in the age of AI means bigger, faster threats
Cybersecurity professionals at SecureWorld Boston had a lot to say about identity management, AI threats and the challenges they face in achieving real-time visibility.
-
IAM Get Started
How to roll out an enterprise passkey deployment
Passkey security sidesteps many of the end-user and cybersecurity issues that plague traditional passwords. Learn how to successfully deploy passkeys in your organization.
-
Analytics & Automation News
At RSAC 2026, AI optimism and anxiety -- and an MIA U.S. government
Depending on whom you ask, AI could mean the end of the world as we know it, or the beginning of a new era of ease and enlightenment in the SOC. Learn more in this video discussion.
-
Network Security Evaluate
RSAC 2026 recap: AI security and network security trends
RSAC 2026 spotlighted AI security as a key theme. Explore insights on securing AI agents, enterprise browsers, sovereignty and platformization trends.
-
Operations & Management
News brief: Microsoft security vulnerabilities revealed
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
Sponsored Sites
-
Articlficial Intelligence
AI-Powered Devices: The Fourth Wave of Enterprise Computing
Enterprise computing enters its fourth wave as client devices transform from passive endpoints to intelligent AI systems. Modern laptops, desktops, and mobile devices now feature built-in NPUs and AI accelerators that bring artificial intelligence directly to where work happens. This shift creates distributed intelligence networks where every device anticipates user needs, optimizes workflows, and collaborates autonomously. Organizations gain enterprise AI at scale, transforming employees into human AI agents with unprecedented access to contextual, personalized computing experiences. The future of work is here—powered by intelligent devices that don't just access AI, but embody it.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
AI
Trusted platforms for every workload
Modern IT is hybrid IT. Your enterprise has infrastructure, platforms, apps, and tools from different vendors. Proprietary tools don’t talk to each other. And apps cross clouds slowly, weighed down by data. And now, managing the growing complexity of AI/ML workloads adds another layer of challenge.You need advancements in infrastructure, management, and development that bring your clouds together. Connect with us to learn how together, Red Hat® and Amazon Web Services (AWS) give you the tools and technologies to adapt to market demands. Scale infrastructure, expand opportunities, and innovate with AI in line with your organization’s needs and business goals.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
CISO checklist: Cybersecurity platform or marketing ploy?
The cybersecurity market is booming with countless vendors claiming to offer unified platforms. Here's how to separate the real deal from empty marketing.
-
Next-generation firewall buyer's guide for CISOs
-
RSAC 2026 recap: AI security and network security trends
-
Identity security at RSAC 2026: The new enterprise dynamics
-
-
Problem Solve
Beyond awareness: Human risk management metrics for CISOs
Traditional security training isn't keeping threat actors out. As employee awareness programs fall short, Forrester Research suggests a better approach.
-
How to improve the SOC analyst experience -- and why it matters
-
RSAC 2026: Cyber insurance and the rise of ransomware
-
Agentic AI's role in amplifying and creating insider risks
-
-
Manage
Inside the SOC that secured RSAC 2026 Conference
Take a behind-the-scenes look at the technology and teamwork that went into creating the security operations center that protected attendees, vendors and staff at RSAC 2026.
-
How to roll out an enterprise passkey deployment
-
8 best practices for a bulletproof IAM strategy
-
Cloud security architecture: Enterprise cloud blueprint for CISOs
-
Information Security Basics
-
Get Started
Beyond awareness: Human risk management metrics for CISOs
Traditional security training isn't keeping threat actors out. As employee awareness programs fall short, Forrester Research suggests a better approach.
-
Get Started
How to roll out an enterprise passkey deployment
Passkey security sidesteps many of the end-user and cybersecurity issues that plague traditional passwords. Learn how to successfully deploy passkeys in your organization.
-
Get Started
Next-generation firewall buyer's guide for CISOs
NGFWs are crucial tools for modern security operations, but CISOs need to understand the often complex deployment, maintenance and budgeting implications.
Multimedia
-
-
-
Get Started
An explanation of quantum key distribution
-
News
View All -
Security operations and management
News brief: Microsoft security vulnerabilities revealed
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
-
Threats and vulnerabilities
News brief: Iranian cyberattacks target U.S. water, energy
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
-
Human vs. AI: Debates shape RSAC 2026 cybersecurity trends
As AI dominated RSAC 2026, CISOs and industry leaders debated its role in security, from agentic applications to the challenges of scaling human involvement in decision-making.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?





