New & Notable
Evaluate
Streamline SecOps with SOAR workflows and playbooks
Through their automated workflows and playbooks, SOAR platforms help SOC teams overcome limited resources, skills gaps and alert fatigue.
How to start an enterprise bug bounty program: A CISO's guide
Bug bounty programs offer flexible rewards, global expertise and enhanced security, helping organizations address vulnerabilities before exploitation.
Evaluate
SIEM isn't dead, its place in the SOC is just evolving
Despite the predictions that SIEM is going away, its role is actually evolving. Learn why SIEM tools remain essential to enterprise security operations.
News
OT attacks get scary with 'living-off-the-plant' techniques
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
— Dark ReadingTrending Topics
-
Data Security & Privacy Manage
How to perform a data risk assessment, step by step
Data risk assessments review how an organization protects its sensitive data and identify necessary improvements by revealing potential vulnerabilities, threats and other risks.
-
Threats & Vulnerabilities News
News brief: Risk of Iran-backed cyberattacks rising in U.S.
Check out the latest security news from the Informa TechTarget team.
-
IAM Manage
CISO's guide to nonhuman identity security
Nonhuman identities are one of the fastest-growing yet least-governed access risks in the enterprise today. Learn how to address them.
-
Analytics & Automation Manage
How to reduce false positive alerts and increase cybersecurity
False positives in cybersecurity detection tools drain resources and distract from real threats. Once CISOs understand the root causes of false positives, they can implement strategies to reduce them.
-
Network Security Evaluate
Comparison of 5 top next-generation firewall vendors
Top NGFWs excel in reliability, scalability, and advanced features such as post-quantum cryptography, but users face steep learning curves and complex licensing.
-
Operations & Management Evaluate
SIEM isn't dead, its place in the SOC is just evolving
Despite the predictions that SIEM is going away, its role is actually evolving. Learn why SIEM tools remain essential to enterprise security operations.
Sponsored Sites
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Streamline SecOps with SOAR workflows and playbooks
Through their automated workflows and playbooks, SOAR platforms help SOC teams overcome limited resources, skills gaps and alert fatigue.
-
SIEM isn't dead, its place in the SOC is just evolving
-
Comparison of 5 top next-generation firewall vendors
-
CISO decisions: Weighing costs, benefits of dark web monitoring
-
-
Problem Solve
How to reduce false positive alerts and increase cybersecurity
False positives in cybersecurity detection tools drain resources and distract from real threats. Once CISOs understand the root causes of false positives, they can implement strategies to reduce them.
-
Enhance security audits with Nmap and NSE scripts
-
CISO's guide: How to prevent business email compromise
-
ASU's CISO: AI craze is a strategic opportunity for security
-
-
Manage
How to perform a data risk assessment, step by step
Data risk assessments review how an organization protects its sensitive data and identify necessary improvements by revealing potential vulnerabilities, threats and other risks.
-
How to build an incident response plan, with examples, template
-
MLSecOps: Bridging security and AI development processes
-
How to evaluate NGFW products to strengthen cybersecurity
-
Information Security Basics
-
Get Started
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan..
-
Get Started
MLSecOps: Bridging security and AI development processes
MLSecOps ensures AI security by automating controls, fostering collaboration and addressing vulnerabilities early in the development lifecycle.
-
Get Started
A leader's guide to integrating EDR, SIEM and SOAR
Understand the architecture, implementation, and maintenance of EDR, SIEM, and SOAR tools to optimize security workflows and ensure resilience.
Multimedia
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
Get Started
An explanation of quantum cryptography
-
News
View All -
Threats and vulnerabilities
News brief: Risk of Iran-backed cyberattacks rising in U.S.
Check out the latest security news from the Informa TechTarget team.
-
OT attacks get scary with 'living-off-the-plant' techniques
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
-
Top cyber industry defenses spike CO2 emissions
Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?






