New & Notable
Get Started
Why identity is the new perimeter – and how to defend it
Identity has replaced network boundaries as today's security perimeter. Organizations must focus on protecting digital identities to safeguard their assets.
Manage
Account lockout policy: Setup and best practices explained
Organizations must carefully balance security and UX when implementing account lockout policies.
Manage
The DOGE effect on cybersecurity: Efficiency vs. risk
The DOGE effect on security is a complex issue. Pursuit of efficiency might be a legitimate goal, but experts caution it can conflict with cybersecurity defenses.
Manage
The DOGE effect on cyber: What's happened and what's next?
In this webinar, part of 'CISO Insights' series, cybersecurity experts debate the pros and cons of the Department of Government Efficiency's actions and the impact on their field.
Trending Topics
-
Data Security & Privacy News
News brief: Week's top breaches stem from third-party attacks
Check out the latest security news from the Informa TechTarget team.
-
Threats & Vulnerabilities Manage
AI model theft: Risk and mitigation in the digital era
Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property.
-
IAM Get Started
Why identity is the new perimeter – and how to defend it
Identity has replaced network boundaries as today's security perimeter. Organizations must focus on protecting digital identities to safeguard their assets.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Get Started
How to create a remote access policy, with template
Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy.
-
Operations & Management News
News brief: CISA and partners face budget overhauls, cuts
Check out the latest security news from the Informa TechTarget team.
Sponsored Sites
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Why identity is the new perimeter – and how to defend it
Identity has replaced network boundaries as today's security perimeter. Organizations must focus on protecting digital identities to safeguard their assets.
-
How to choose a cloud key management service
-
What is data risk management? Key risks and best practices
-
DLP in the GenAI Era: Shadow data and DLP product churn
-
-
Problem Solve
How to spot and expose fraudulent North Korean IT workers
North Koreans have infiltrated countless U.S. companies as remote IT workers. That means your top developer could also work for one of the world's most notorious dictators.
-
How to use arpwatch to monitor network changes
-
Top 5 ransomware attack vectors and how to avoid them
-
How to create custom sudo configuration files in /etc/sudoers
-
-
Manage
Account lockout policy: Setup and best practices explained
Organizations must carefully balance security and UX when implementing account lockout policies.
-
The DOGE effect on cybersecurity: Efficiency vs. risk
-
The DOGE effect on cyber: What's happened and what's next?
-
Security risks of AI-generated code and how to manage them
-
Information Security Basics
-
Get Started
Why identity is the new perimeter – and how to defend it
Identity has replaced network boundaries as today's security perimeter. Organizations must focus on protecting digital identities to safeguard their assets.
-
Get Started
What is cyber extortion?
Cyber extortion is a crime involving an attack or threat of an attack, coupled with a demand for money or some other response, in return for stopping an attack or preventing one from happening.
-
Get Started
What is the WannaCry ransomware attack?
WannaCry ransomware is a cyberattack that spread by exploiting vulnerabilities in earlier and unpatched versions of the Windows operating system (OS).
Multimedia
-
News
View All -
Security operations and management
News brief: CISA and partners face budget overhauls, cuts
Check out the latest security news from the Informa TechTarget team.
-
Data security and privacy
News brief: Week's top breaches stem from third-party attacks
Check out the latest security news from the Informa TechTarget team.
-
Application and platform security
News brief: Patch critical SAP, Samsung and chat app flaws now
Check out the latest security news from the Informa TechTarget team.
Search Security Definitions
- What is cyber extortion?
- What is the WannaCry ransomware attack?
- What is a chief risk officer (CRO)? A detailed CRO job description
- What is a next-generation firewall (NGFW)?
- What is a time-based one-time password?
- What is security?
- What is triple extortion ransomware?
- What is double extortion ransomware? How to defend your organization