Security operations and management
Cybersecurity operations and management are vital to protect enterprises against cyber threats. Learn how to create and manage infosec programs and SOCs, perform incident response and automate security processes. Also read up on security laws and regulations, best practices for CISOs and more.
Top Stories
-
Tip
07 May 2026
How to construct an effective security controls evaluation
Some CISOs believe their security controls are sufficient, but reach that conclusion without any method for measuring their effectiveness. There's a much better way. Continue Reading
By- Ed Moyle, SecurityCurve
-
Tip
06 May 2026
Buyer's guide for CISOs: Cloud security posture management
Cloud security posture management is a critical component of cloud defense strategy. Need help choosing a CSPM platform? This guide lists key features and platforms to consider. Continue Reading
By- Dave Shackleford, Voodoo Security
-
News
05 May 2026
ServiceNow reintroduces itself as an AI 'security company'
ServiceNow pulls ahead of other agent orchestrators with expanded AI security features, experts say, as enterprises proceed cautiously toward agent autonomy. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
04 May 2026
How cyber insurance helped with breach recovery -- or not
Four organizations, each with cyber insurance policies, responded differently to data breaches. Read the real-world examples of what went right and wrong. Continue Reading
By- Richard Livingston, Site Editor
-
Tip
30 Apr 2026
What every CISO should consider before a SIEM migration
Before starting a SIEM migration, the security team must identify the data, rules, workflows and policies they need to transition to the new tool or service. Here's how to get started. Continue Reading
By- John Burke, Nemertes Research
-
Feature
30 Apr 2026
AI security risks force CIOs to rethink strategy
In this Q&A, Michael Spisak of Unit 42, Palo Alto Networks, explains the cybersecurity risks and opportunities that enterprises now face with the rapid rise of AI. Continue Reading
By- Jim O'Donnell, News Director
-
Tip
30 Apr 2026
CISO's guide to centralized vs. federated security models
CISOs must juggle flexibility, consistency and risk when considering the enterprise's security structure. Discover the benefits and drawbacks of different security models. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
28 Apr 2026
Shadow code: The hidden threat for enterprise IT
The shadow code running in your web apps could be a ticking time bomb. Learn more about the cybersecurity risks of shadow code and how to protect your enterprise. Continue Reading
By- Karen Kent, Trusted Cyber Annex
-
Tip
27 Apr 2026
How to fix cybersecurity's agentic AI identity crisis
AI agents are transforming enterprise operations, but their autonomy poses critical security challenges. Learn how to secure these powerful digital actors. Continue Reading
By- Matthew Smith, Seemless Transition LLC
-
Tip
24 Apr 2026
5 top SIEM use cases in the enterprise
In the age of AI everything, SIEM isn't exactly flashy -- but it still matters. Explore top SIEM use cases that span the enterprise, from cybersecurity to IT ops. Continue Reading
By- John Burke, Nemertes Research
-
News
24 Apr 2026
News brief: AI woes continue for security leaders
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading. Continue Reading
By -
Feature
23 Apr 2026
Is SOAR dead or alive? Sort of
Orchestration and automation capabilities remain critical elements in effective cyber defense. Just don't expect to hear much about SOAR anymore. Continue Reading
-
Feature
23 Apr 2026
The push for digital sovereignty: What CISOs need to know
Digital sovereignty is reshaping global IT strategies and governments are prioritizing local tech to reduce foreign dependencies. Find out what this means for your organization. Continue Reading
-
Feature
21 Apr 2026
Beyond awareness: Human risk management metrics for CISOs
Traditional security training isn't keeping threat actors out. As employee awareness programs fall short, Forrester Research suggests a better approach. Continue Reading
By- Richard Livingston, Site Editor
-
Video
17 Apr 2026
At RSAC 2026, AI optimism and anxiety -- and an MIA U.S. government
Depending on whom you ask, AI could mean the end of the world as we know it, or the beginning of a new era of ease and enlightenment in the SOC. Learn more in this video discussion. Continue Reading
By- Alissa Irei, Senior Site Editor
-
News
17 Apr 2026
News brief: Microsoft security vulnerabilities revealed
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading. Continue Reading
By -
Conference Coverage
17 Apr 2026
RSAC 2026 Conference: Key news and industry analysis
Check out SearchSecurity's RSAC 2026 guide for reports on notable presentations and breaking news at the world's biggest infosec event. Continue Reading
By- Sharon Shea, Executive Editor
-
Feature
15 Apr 2026
Inside the SOC that secured RSAC 2026 Conference
Take a behind-the-scenes look at the technology and teamwork that went into creating the security operations center that protected attendees, vendors and staff at RSAC 2026. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
15 Apr 2026
4 strategic approaches to effective shadow AI governance
Shadow AI is a technological risk and a governance challenge. Organizations must combine structured frameworks, continuous visibility and education to control these risks. Continue Reading
By -
Feature
14 Apr 2026
How to improve the SOC analyst experience -- and why it matters
Burned-out security analysts miss threats, take longer to investigate incidents and are more likely to quit. Here's how CISOs can improve the SOC analyst experience. Continue Reading
-
News
10 Apr 2026
Human vs. AI: Debates shape RSAC 2026 cybersecurity trends
As AI dominated RSAC 2026, CISOs and industry leaders debated its role in security, from agentic applications to the challenges of scaling human involvement in decision-making. Continue Reading
— Dark Reading -
Feature
10 Apr 2026
CISO checklist: Cybersecurity platform or marketing ploy?
The cybersecurity market is booming with countless vendors claiming to offer unified platforms. Here's how to separate the real deal from empty marketing. Continue Reading
By- Alissa Irei, Senior Site Editor
-
News
09 Apr 2026
Focusing on the people in cybersecurity at RSAC 2026 Conference
AI dominated RSAC 2026 Conference, but it's still the humans in cybersecurity who matter most. Continue Reading
— Dark Reading -
News
09 Apr 2026
RSAC 2026: How AI Is reshaping cybersecurity faster than ever
Dark Reading's Kelly Jackson Higgins shares insights on the past, present, and future of cybersecurity after attending RSAC 2026 Conference. Continue Reading
— Dark Reading -
Tip
09 Apr 2026
Next-generation firewall buyer's guide for CISOs
NGFWs are crucial tools for modern security operations, but CISOs need to understand the often complex deployment, maintenance and budgeting implications. Continue Reading
By- Karen Kent, Trusted Cyber Annex
-
Tip
09 Apr 2026
8 best practices for a bulletproof IAM strategy
IAM systems enable secure access to applications and resources. But to benefit from IAM -- and avoid a security failure -- teams must know which best practices to follow. Continue Reading
-
Feature
08 Apr 2026
RSAC 2026: Cyber insurance and the rise of ransomware
At RSAC 2026, John Kindervag proposed the idea that the rise of the cyber insurance industry has motivated ransomware threat actors to escalate their attacks and ask for more. Continue Reading
By- Richard Livingston, Site Editor
-
Opinion
07 Apr 2026
RSAC 2026 recap: AI security and network security trends
RSAC 2026 spotlighted AI security as a key theme. Explore insights on securing AI agents, enterprise browsers, sovereignty and platformization trends. Continue Reading
By- John Grady, Principal Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Opinion
07 Apr 2026
Identity security at RSAC 2026: The new enterprise dynamics
Omdia analyst Todd Thiemann made the rounds at RSAC 2026 Conference, speaking with CISOs, practitioners and vendors to identify the latest shifts in identity and data security. Continue Reading
By- Todd Thiemann, Principal Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Tip
06 Apr 2026
Meaningful metrics demonstrate the value of cyber-resiliency
Cyber-resilience metrics translate raw technical performance into real business outcomes. The right analytics can enhance more than just security operations. Continue Reading
By -
Tip
02 Apr 2026
5 top SOC-as-a-service providers and how to evaluate them
SOCaaS simplifies security operations. Compare five providers and key evaluation criteria, including tools, automation, threat intelligence and compliance. Continue Reading
By- John Burke, Nemertes Research
-
Tip
02 Apr 2026
Cloud security architecture: Enterprise cloud blueprint for CISOs
As cloud adoption unlocks innovation, it also introduces new risks. A sound cloud security architecture is the blueprint for secure enterprise cloud deployments. Continue Reading
By- Dave Shackleford, Voodoo Security
-
News
01 Apr 2026
'Missed opportunity': U.S. government’s absence from RSAC Conference leaves stark void
The Trump administration’s decision to not attend the world’s biggest cybersecurity conference sent the wrong message to partners, experts said. Continue Reading
— Cybersecurity Dive -
News
01 Apr 2026
Geopolitics, AI and cybersecurity: Insights from RSAC 2026
AI-driven threats, global leadership shifts and the future of cybersecurity in a rapidly evolving landscape were among the discussions at RSAC 2026 Conference. Continue Reading
— Dark Reading -
News
01 Apr 2026
RSAC 2026: AI dominates, but community remains key to security
As AI took center stage at this year's conference, experts debated automation, oversight and the evolving role of human intelligence in cybersecurity -- despite the U.S. government's notable absence. Continue Reading
— Dark Reading -
Feature
31 Mar 2026
CIOs must now model war as an enterprise risk
In the wake of the Iran-backed hacktivist attacks on Stryker, CIOs rethink enterprise risk models to account for different attacker intents and methods. Continue Reading
-
Feature
30 Mar 2026
How AI caught a malicious North Korean insider at Exabeam
A North Korean posing as an American tech worker used GenAI to infiltrate Exabeam's network. But agentic AI found the signals among UEBA noise and exposed him in a matter of seconds. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Feature
27 Mar 2026
Watch your words: Tim Brown's advice for CISOs
During RSAC 2026, Tim Brown discussed the SolarWinds breach, his SEC indictment and the critical need for communication policies. Continue Reading
By- Sharon Shea, Executive Editor
-
News
27 Mar 2026
How organizations can use mistakes to level up their security programs
Organizations repeatedly expose ports, reuse passwords, and skip patches, creating security gaps that attackers exploit for breaches. An industry veteran outlines ways to fix these common mistakes. Continue Reading
— Dark Reading -
News
26 Mar 2026
Companies face difficult choices in blaming hackers for an attack
Publicly naming a hacking group can affect everything from retaliation to insurance coverage. Continue Reading
— Cybersecurity Dive -
News
26 Mar 2026
Congress wants details from White House on cyber strategy, Iran resilience measures
Lawmakers’ aides from both parties say they want to be kept in the loop on implementation. Continue Reading
— Cybersecurity Dive -
News
26 Mar 2026
Blame game: Why public cyber attribution carries risks
Publicly accusing an entity of a cyberattack could have negative consequences that organizations should consider before taking the plunge. Continue Reading
— Dark Reading -
News
26 Mar 2026
At RSAC, the EU leads while US officials are sidelined
While US government sits out this year, EU officials are on the ground in San Francisco leading the conversations on today's top cybersecurity challenges. Continue Reading
— Dark Reading -
Tip
24 Mar 2026
10 enterprise secure remote access best practices
Remote access is a critical necessity in today's work-from-anywhere environment. It's also incredibly risky. But there are ways to protect assets and combat potential attacks. Continue Reading
By- Karen Kent, Trusted Cyber Annex
-
News
24 Mar 2026
AI in the SOC: What could go wrong?
Two cybersecurity leaders tested out AI in their respective SOCs for six months -- and here's what they learned. Continue Reading
— Dark Reading -
News
24 Mar 2026
CISOs debate human role in AI-powered security
The idea of a "human in the loop" in AI deployment was challenged during a security executive panel at the RSAC 2026 Conference this week. Continue Reading
— Dark Reading -
News
22 Mar 2026
Clear communication: The missing link in cybersecurity success
When technical expertise meets clear communication, cybersecurity teams thrive. Learn how to foster trust and collaboration across diverse working groups. Continue Reading
— Dark Reading -
Tip
17 Mar 2026
Top UEBA use cases in enterprise cybersecurity
User and entity behavior analytics tools find patterns hidden in an ocean of data, making them critically important in cybersecurity. Explore key UEBA use cases in the enterprise. Continue Reading
By- John Burke, Nemertes Research
-
Tip
17 Mar 2026
Boost SOC efficiency with Python security automation
Resource-strapped SOCs need better incident response, threat hunting and report generation. Explore how automating tasks with Python makes life easier for security teams. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Video
16 Mar 2026
Lessons in incident response from the Olympics, World Cup
Cybersecurity lessons from global sports events show that preparation, defense and quick recovery are essential to besting adversaries. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
16 Mar 2026
Calculating the ROI of AI in cybersecurity
Investing in AI tools can benefit an organization's security posture. Understanding and quantifying those improvements, however, poses a real challenge. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
Tip
13 Mar 2026
Streamline SecOps with SOAR workflows and playbooks
Through their automated workflows and playbooks, SOAR platforms help SOC teams overcome limited resources, skills gaps and alert fatigue. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Feature
11 Mar 2026
SIEM isn't dead, its place in the SOC is just evolving
Despite the predictions that SIEM is going away, its role is actually evolving. Learn why SIEM tools remain essential to enterprise security operations. Continue Reading
-
News
09 Mar 2026
Top cyber industry defenses spike CO2 emissions
Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks. Continue Reading
— Dark Reading -
News
09 Mar 2026
Enigma cipher device still holds secrets for cyber pros
The Nazi relic's history is riddled with resilience errors, and those lessons still apply to defending against modern cyberthreats. Continue Reading
— Dark Reading -
News
09 Mar 2026
The case for why better breach transparency matters
It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse -- not disclose the incident at all. Continue Reading
— Dark Reading -
Tip
03 Mar 2026
How to reduce false positive alerts and increase cybersecurity
False positives in cybersecurity detection tools drain resources and distract from real threats. Once CISOs understand the root causes of false positives, they can implement strategies to reduce them. Continue Reading
By- Karen Kent, Trusted Cyber Annex
-
Tip
02 Mar 2026
How to perform a data risk assessment, step by step
Data risk assessments review how an organization protects its sensitive data and identify necessary improvements by revealing potential vulnerabilities, threats and other risks. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Karen Kent, Trusted Cyber Annex
-
Tip
26 Feb 2026
CISO decisions: Weighing costs, benefits of dark web monitoring
Forewarned is forearmed, and dark web monitoring can alert organizations when they're in attacker crosshairs. But for many, the risk and expense make it more trouble than it's worth. Continue Reading
By- John Burke, Nemertes Research
-
Tip
26 Feb 2026
Counter third-party risk with continuous vendor monitoring
Assessing a vendor's security posture is not a box that gets checked. The risk of a third-party attack requires the kind of diligence provided by continuous vendor monitoring. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Feature
26 Feb 2026
From security to trust: How AI is transforming the CISO's job
Modern security officers must manage AI risks, safeguard enterprise data and ensure AI systems operate securely, expanding their role beyond traditional cybersecurity. Continue Reading
By- Kinza Yasar, Technical Writer
-
Tip
24 Feb 2026
Top threat modeling tools, plus features to look for
Automated threat modeling tools make identifying threats simpler, but the tools themselves can be fairly complex. Understanding where risks exist is only one part of the process. Continue Reading
By -
Tip
23 Feb 2026
Enhance security audits with Nmap and NSE scripts
The Nmap Scripting Engine feature enables security admins to automate scans, detect vulnerabilities and validate network security settings. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Feature
20 Feb 2026
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan. Continue Reading
By -
Tip
19 Feb 2026
MLSecOps: Bridging security and AI development processes
MLSecOps ensures AI security by automating controls, fostering collaboration and addressing vulnerabilities early in the development lifecycle. Continue Reading
By- Ed Moyle, SecurityCurve
-
Tip
18 Feb 2026
How to evaluate NGFW products to strengthen cybersecurity
Next-generation firewalls are critical tools in today's evolving threat landscape. Learn how to evaluate and select an NGFW that will bolster your company's cybersecurity posture. Continue Reading
By- Karen Kent, Trusted Cyber Annex
-
Tip
17 Feb 2026
CISO's guide to demonstrating cyber resilience
Elevating cybersecurity to a state of resilience requires a security team to adapt and strengthen defenses. The result should be that a future attack is less likely to succeed. Continue Reading
By -
Tip
13 Feb 2026
CISO's guide: How to prevent business email compromise
Business email compromise feeds on professional email norms -- and exploits emotions such as fear or urgency. Learn what BEC is, how it works and how to prevent it. Continue Reading
-
News
13 Feb 2026
News brief: 6 Microsoft zero days and a warning from CISA
Check out the latest security news from the Informa TechTarget team. Continue Reading
By -
Feature
12 Feb 2026
ASU's CISO: AI craze is a strategic opportunity for security
All eyes in the C-suite are on AI, and Arizona State University's CISO is seizing the moment. Learn how AI is solving problems that cybersecurity has been flagging for years. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
12 Feb 2026
How to build an incident response framework
Frameworks provide the structure for an effective incident response program. Here's where to turn for guidance on what to include. Continue Reading
By -
Feature
12 Feb 2026
How CISOs can balance AI innovation and security risk
AI represents a powerful new tool for cybersecurity professionals, but the technology is not without risk. Discover what CISOs need to know when deciding how to use AI. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Feature
10 Feb 2026
What the 2026 Global Risks Report means for CIOs
Rising AI, cyber, and geopolitical risks are no longer abstract—CIOs must lead in building resilient, adaptable enterprise technology. Continue Reading
-
Tip
09 Feb 2026
A leader's guide to integrating EDR, SIEM and SOAR
Understand the architecture, implementation, and maintenance of EDR, SIEM, and SOAR tools to optimize security workflows and ensure resilience. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
06 Feb 2026
Secure MCP servers to safeguard AI and corporate data
Model Context Protocol servers act as bridges between AI models and enterprise resources. But they can also give threat actors the keys to the castle if not secured. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Tip
06 Feb 2026
Why organizations need cloud attack surface management
Cloud environments constantly change, expanding attack surfaces beyond traditional tools. Cloud ASM delivers continuous visibility to identify exposures, misconfigurations and risk. Continue Reading
By- Dave Shackleford, Voodoo Security
-
News
06 Feb 2026
News brief: Ransomware trends show new twists to old game
Check out the latest security news from the Informa TechTarget team. Continue Reading
By -
Feature
05 Feb 2026
Top 7 reasons incident response plans fail
Incident response plans can fall apart when faced with real-world security events. Learn about the gaps that can lead to failure and how to avoid them. Continue Reading
-
Feature
05 Feb 2026
10 types of information security threats for IT teams
Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. Continue Reading
By- Karen Kent, Trusted Cyber Annex
-
News
04 Feb 2026
AI security worries stall enterprise production deployments
From Big Tech executives at Cisco's AI Summit this week to market research, the industry is waking up to a major hindrance in enterprise AI adoption. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
04 Feb 2026
Top open source and commercial threat intelligence feeds
Cybersecurity threat intelligence feeds provide critical data on attacks, including IPs, domains and malware hashes, helping teams detect and respond to threats effectively. Continue Reading
By- Karen Kent, Trusted Cyber Annex
-
Feature
02 Feb 2026
10 must-have security technologies in 2026
Discover the top security technologies for 2026, from AI-enabled tools to quantum-safe protocols, as CISOs brace for evolving cyberthreats and attack surfaces. Continue Reading
-
Feature
30 Jan 2026
Quantifying cyber-risk at Netflix, Highmark Health: Case studies
Show me the money: In these case studies, learn how the FAIR model helped a nonprofit healthcare company and a streaming giant quantify cyber-risk in financial terms. Continue Reading
-
Feature
29 Jan 2026
Cybersecurity and business needs: A CISO's 2026 outlook
Uncover the 2026 cybersecurity predictions, trends, tools and strategies CISOs need to navigate evolving business and threat landscapes. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
29 Jan 2026
CERT vs. CSIRT vs. SOC: What's the difference?
What's in a name? In incident response parlance, there are subtle -- and sometimes confusing -- distinctions among a CERT, a CSIRT, a CIRT and a SOC. Continue Reading
By- Ed Moyle, SecurityCurve
-
Feature
26 Jan 2026
10 cybersecurity trends to watch in 2026
As cyber-risks escalate in 2026, CISOs face AI-powered attacks, OT vulnerabilities and quantum computing threats. Read more on the key trends shaping security. Continue Reading
-
Feature
21 Jan 2026
Top 10 cybersecurity predictions for 2026
AI will further reshape cybersecurity in 2026, predict CISOs. From agentic AI defensive toolchains to MCP server risks, explore the anticipated shifts. Continue Reading
By- Alissa Irei, Senior Site Editor
- Phil Sweeney, Industry Editor
-
Feature
16 Jan 2026
Majority of CISOs now hold executive-level titles, IANS reports
More organizations grant the CISO an executive title, an IANS survey found, as the top security job becomes less of a hands-on position and more of a business leader role. Continue Reading
By- Phil Sweeney, Industry Editor
-
Feature
16 Jan 2026
How enterprise access decisions are starting to show up earlier
As work consolidates in browsers and quick-entry paths, access decisions are shifting to the front door of enterprise systems, often without clear ownership or centralized control. Continue Reading
By- James Alan Miller, Senior Executive Editor
-
Tip
15 Jan 2026
10 important incident response metrics and how to use them
In incident response, security teams can improve their work by knowing how long it takes to respond to and remediate threats. These are the key metrics to track. Continue Reading
By- John Burke, Nemertes Research
-
Tip
14 Jan 2026
Vibe coding security risks and how to mitigate them
Vibe coding with generative AI is transforming software development, accelerating innovation and introducing new security risks to manage. Continue Reading
By- Matthew Smith, Seemless Transition LLC
-
Feature
12 Jan 2026
Cybersecurity conferences to attend in 2026
Discover the top cybersecurity conferences of 2026 to sharpen skills, network with peers, learn the latest industry trends and stay ahead of emerging threats. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
08 Jan 2026
CISO reporting structure key to strong cybersecurity outcomes
Find out which CISO reporting structure a cybersecurity expert recommends, based on objective security performance metrics from hundreds of organizations. Continue Reading
By- John Burke, Nemertes Research
- Alissa Irei, Senior Site Editor
-
Feature
22 Dec 2025
Prepare for the 2026 threatscape with thought leaders' insights
Explore the 2026 cybersecurity landscape, featuring AI-first strategies, human-centric defenses, cloud security and resilience-focused operations. Continue Reading
By- Ana Salom-Boira, Editorial Manager -- Content Innovation
-
Tip
18 Dec 2025
DevSecOps vs. SecDevOps: Which is better for your organization?
How far left should security shift? DevSecOps and SecDevOps both integrate security into DevOps but differ conceptually and practically. Learn which model suits your needs. Continue Reading
By- Matthew Smith, Seemless Transition LLC
-
Tip
17 Dec 2025
How to detect a deepfake with visual clues and AI tools
Forewarned is forearmed, but too many employees don't realize how sophisticated deepfakes have become. Integrate these deepfake detection tips into security awareness training. Continue Reading
By- Alissa Irei, Senior Site Editor
- Andrew Froehlich, West Gate Networks
-
Tip
16 Dec 2025
Incident response: How to implement a communication plan
Communication is critical to an effective incident response plan. Here are best practices for communication planning and an editable template to help you get started. Continue Reading
By -
News
12 Dec 2025
News brief: Future of security holds bigger budgets, new threats
Check out the latest security news from the Informa TechTarget team. Continue Reading
By -
Tip
10 Dec 2025
Beyond the SBOM: What CISOs should know about CBOMs and HBOMs
SBOMs, CBOMs and HBOMS -- oh my! Learn how these bills of materials help manage supply chain risk and assess which of the three your organization needs. Continue Reading
By- Paul Kirvan
- Alissa Irei, Senior Site Editor
-
Tip
08 Dec 2025
Guide to using digital twins for cybersecurity testing
The digital twin market is growing rapidly as more security teams use the technique to run what-if scenarios to determine if their enterprise networks are vulnerable. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
03 Dec 2025
What CISOs should know about SOC modernization
To achieve security outcomes that align with their organizations' risk appetites and business objectives, CISOs with struggling SOCs must consider upgrades. Learn more. Continue Reading
By -
Tip
24 Nov 2025
5 steps for a smooth SIEM implementation
SIEM migration doesn't have to be chaotic. Smart planning and phased deployment can prevent a rocky rollout and pave the way for a smooth transition. Here's your roadmap. Continue Reading
By- Karen Kent, Trusted Cyber Annex