New & Notable

Manage

The DOGE effect on cybersecurity: Efficiency vs. risk

The DOGE effect on security is a complex issue. Pursuit of efficiency might be a legitimate goal, but experts caution it can conflict with cybersecurity defenses.

Manage

The DOGE effect on cyber: What's happened and what's next?

In this webinar, part of 'CISO Insights' series, cybersecurity experts debate the pros and cons of the Department of Government Efficiency's actions and the impact on their field.

News

News brief: Week's top breaches stem from third-party attacks

Check out the latest security news from the Informa TechTarget team.

Manage

Security risks of AI-generated code and how to manage them

Application security teams are understandably worried about how developers use GenAI and LLMs to create code. But it's not all doom and gloom; GenAI can help secure code, too.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    chief risk officer (CRO)

    The chief risk officer (CRO) is a senior executive tasked with assessing, overseeing and mitigating an organization's risks.

  • Get Started

    next-generation firewall

    A next-generation firewall (NGFW) is a network security device that combines traditional firewall capabilities with advanced features to detect and block sophisticated cyberattacks.

  • Get Started

    What is a time-based one-time password?

    A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security