New & Notable

Manage

Data after the breach: Economics of the dark web

A breach is just the beginning. Once extracted, data moves through a sophisticated supply chain. Peek inside the dark web economy that turns stolen credentials into billions of dollars in profit.

Evaluate

The breakup: Why CISOs are decoupling data from their SIEMs

Breaking up is hard to do -- but some CISOs find that decoupling SIEMs from security log data feeds is worth it. Learn about the benefits and challenges.

News

News brief: Security worries and warnings as AI use expands

Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.

Evaluate

How to construct an effective security controls evaluation

Some CISOs believe their security controls are sufficient, but reach that conclusion without any method for measuring their effectiveness. There's a much better way.

Find Solutions For Your Project

Information Security Basics

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security