New & Notable
News
Human vs. AI: Debates shape RSAC 2026 cybersecurity trends
As AI dominated RSAC 2026, CISOs and industry leaders debated its role in security, from agentic applications to the challenges of scaling human involvement in decision-making.
— Dark ReadingEvaluate
CISO checklist: Cybersecurity platform or marketing ploy?
The cybersecurity market is booming with countless vendors claiming to offer unified platforms. Here's how to separate the real deal from empty marketing.
News
RSAC 2026 Conference: Key news and industry analysis
Check out SearchSecurity's RSAC 2026 guide for reports on notable presentations and breaking news at the world's biggest infosec event.
News
Inconsistent privacy labels don't tell users what they are getting
Data privacy labels are a great idea for mobile apps, but the current versions just aren't good enough.
— Dark ReadingTrending Topics
-
Data Security & Privacy Evaluate
Secure file transfer services: Types, tools and selection tips
With so many options, finding the best secure file transfer service can feel daunting. Discover top tools and what you need to make the right decision for your business.
-
Threats & Vulnerabilities News
News brief: Iranian cyberattacks target U.S. water, energy
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
-
IAM Manage
8 best practices for a bulletproof IAM strategy
IAM systems enable secure access to applications and resources. But to benefit from IAM -- and avoid a security failure -- teams must know which best practices to follow.
-
Analytics & Automation Manage
Meaningful metrics demonstrate the value of cyber-resiliency
Cyber-resilience metrics translate raw technical performance into real business outcomes. The right analytics can enhance more than just security operations.
-
Network Security Evaluate
RSAC 2026 recap: AI security and network security trends
RSAC 2026 spotlighted AI security as a key theme. Explore insights on securing AI agents, enterprise browsers, sovereignty and platformization trends.
-
Operations & Management News
RSAC 2026 Conference: Key news and industry analysis
Check out SearchSecurity's RSAC 2026 guide for reports on notable presentations and breaking news at the world's biggest infosec event.
Sponsored Sites
-
Articlficial Intelligence
AI-Powered Devices: The Fourth Wave of Enterprise Computing
Enterprise computing enters its fourth wave as client devices transform from passive endpoints to intelligent AI systems. Modern laptops, desktops, and mobile devices now feature built-in NPUs and AI accelerators that bring artificial intelligence directly to where work happens. This shift creates distributed intelligence networks where every device anticipates user needs, optimizes workflows, and collaborates autonomously. Organizations gain enterprise AI at scale, transforming employees into human AI agents with unprecedented access to contextual, personalized computing experiences. The future of work is here—powered by intelligent devices that don't just access AI, but embody it.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Security
Leading the Way in Corrections Technology
From creating safer facilities to supporting stronger reentry outcomes, Aventiv, and its family of brands: Securus Technologies, Securus Monitoring and JPay, delivers technology solutions that safely and securely transform corrections environments for everyone.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
CISO checklist: Cybersecurity platform or marketing ploy?
The cybersecurity market is booming with countless vendors claiming to offer unified platforms. Here's how to separate the real deal from empty marketing.
-
Next-generation firewall buyer's guide for CISOs
-
RSAC 2026 recap: AI security and network security trends
-
Identity security at RSAC 2026: The new enterprise dynamics
-
-
Problem Solve
RSAC 2026: Cyber insurance and the rise of ransomware
At RSAC 2026, John Kindervag proposed the idea that the rise of the cyber insurance industry has motivated ransomware threat actors to escalate their attacks and ask for more.
-
Agentic AI's role in amplifying and creating insider risks
-
Meaningful metrics demonstrate the value of cyber-resiliency
-
Cloud security architecture: Enterprise cloud blueprint for CISOs
-
-
Manage
8 best practices for a bulletproof IAM strategy
IAM systems enable secure access to applications and resources. But to benefit from IAM -- and avoid a security failure -- teams must know which best practices to follow.
-
Watch your words: Tim Brown's advice for CISOs
-
10 enterprise secure remote access best practices
-
Boost SOC efficiency with Python security automation
-
Information Security Basics
-
Get Started
Next-generation firewall buyer's guide for CISOs
NGFWs are crucial tools for modern security operations, but CISOs need to understand the often complex deployment, maintenance and budgeting implications.
-
Get Started
Cloud security architecture: Enterprise cloud blueprint for CISOs
As cloud adoption unlocks innovation, it also introduces new risks. A sound cloud security architecture is the blueprint for secure enterprise cloud deployments.
-
Get Started
Watch your words: Tim Brown's advice for CISOs
During RSAC 2026, Tim Brown discussed the SolarWinds breach, his SEC indictment and the critical need for communication policies.
Multimedia
-
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
News
View All -
Threats and vulnerabilities
News brief: Iranian cyberattacks target U.S. water, energy
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
-
Human vs. AI: Debates shape RSAC 2026 cybersecurity trends
As AI dominated RSAC 2026, CISOs and industry leaders debated its role in security, from agentic applications to the challenges of scaling human involvement in decision-making.
-
Inconsistent privacy labels don't tell users what they are getting
Data privacy labels are a great idea for mobile apps, but the current versions just aren't good enough.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?





