New & Notable
Manage
Security risks of AI-generated code and how to manage them
Application security teams are understandably worried about how developers use GenAI and LLMs to create code. But it's not all doom and gloom; GenAI can help secure code, too.
Evaluate
How to choose a cloud key management service
Amazon, Microsoft, Google, Oracle and cloud-agnostic vendors offer cloud key management services. Read up on what each offers and how to choose the right KMS for your company.
Get Started
How to create a remote access policy, with template
Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy.
Get Started
What is data risk management? Key risks and best practices
Data risk management identifies, assesses and mitigates threats to organizational data, safeguarding sensitive information from unauthorized access.
Trending Topics
-
Data Security & Privacy News
News brief: Week's top breaches stem from third-party attacks
Check out the latest security news from the Informa TechTarget team.
-
Threats & Vulnerabilities Manage
AI model theft: Risk and mitigation in the digital era
Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property.
-
IAM Manage
RSAC 2025 Conference: Identity security highlights
RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Get Started
How to create a remote access policy, with template
Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy.
-
Operations & Management News
RSAC Conference 2025
Follow SearchSecurity's RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
Sponsored Sites
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
How to choose a cloud key management service
Amazon, Microsoft, Google, Oracle and cloud-agnostic vendors offer cloud key management services. Read up on what each offers and how to choose the right KMS for your company.
-
What is data risk management? Key risks and best practices
-
DLP in the GenAI Era: Shadow data and DLP product churn
-
Key network security takeaways from RSAC 2025
-
-
Problem Solve
How to spot and expose fraudulent North Korean IT workers
North Koreans have infiltrated countless U.S. companies as remote IT workers. That means your top developer could also work for one of the world's most notorious dictators.
-
How to use arpwatch to monitor network changes
-
Top 5 ransomware attack vectors and how to avoid them
-
How to create custom sudo configuration files in /etc/sudoers
-
-
Manage
Security risks of AI-generated code and how to manage them
Application security teams are understandably worried about how developers use GenAI and LLMs to create code. But it's not all doom and gloom; GenAI can help secure code, too.
-
Best practices for board-level cybersecurity oversight
-
AI model theft: Risk and mitigation in the digital era
-
RSAC 2025 Conference: Identity security highlights
-
Information Security Basics
-
Get Started
What is security?
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.
-
Get Started
What is triple extortion ransomware?
Triple extortion ransomware is a type of ransomware attack in which a cybercriminal extorts their victim multiple times -- namely by encrypting data, exposing exfiltrated data and then threatening an additional third attack vector.
-
Get Started
What is double extortion ransomware? How to defend your organization
Double extortion ransomware is a type of cyberattack that encrypts a victim's data, like in a traditional ransomware attack, while also adding a second attack vector of stealing that data.
Multimedia
-
News
View All -
Data security and privacy
News brief: Week's top breaches stem from third-party attacks
Check out the latest security news from the Informa TechTarget team.
-
Application and platform security
News brief: Patch critical SAP, Samsung and chat app flaws now
Check out the latest security news from the Informa TechTarget team.
-
RSAC 2025: AI everywhere, trust nowhere
We're at an inflection point. AI is changing the game, but the rules haven't caught up.
Search Security Definitions
- What is security?
- What is triple extortion ransomware?
- What is double extortion ransomware? How to defend your organization
- What is data security posture management (DSPM)?
- What is a firewall and why do I need one?
- What is risk appetite?
- What is penetration testing?
- What is a security operations center (SOC)?