New & Notable
News
News brief: Cyberattack trends signal security arms race
Check out the latest security news from the Informa TechTarget team.
Manage
How to build a cybersecurity team to maximize business impact
How CISOs design and build their security teams is as important as the technology they select to safeguard their organizations' digital assets.
Problem Solve
How to calculate cybersecurity ROI for CEOs and boards
Calculating and communicating cybersecurity ROI can help persuade top management to invest. Here's how to use meaningful, concrete metrics that resonate with business leaders.
Get Started
An explanation of identity and access management
Identity and access management systems safeguard businesses by controlling digital identities, managing access rights and implementing security protocols.
Trending Topics
-
Data Security & Privacy Manage
How CISOs can prepare for the quantum cybersecurity threat
CISOs should begin preparing now for quantum computing's impact on cybersecurity. Start with assessments and planning before migrating to post-quantum cryptography standards.
-
Threats & Vulnerabilities News
News brief: Cyberattack trends signal security arms race
Check out the latest security news from the Informa TechTarget team.
-
IAM Get Started
An explanation of identity and access management
Identity and access management systems safeguard businesses by controlling digital identities, managing access rights and implementing security protocols.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Evaluate
Zscaler delivers network, data security tools at Zenith Live
Zscaler has expanded beyond ZTNA with three strategic pillars and aims to challenge traditional security infrastructure.
-
Operations & Management Manage
CISO role in ASM could add runtime security, tokenization
Runtime security and tokenization stand to play a bigger role in attack surface management, a development that could influence security leaders' responsibilities.
Sponsored Sites
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
How to perform a cybersecurity risk assessment in 5 steps
When assessing cybersecurity risk, be sure to consider the scope of the project, your organization's specific assets and leadership's tolerance for risk.
-
What is the future of cybersecurity?
-
What is risk management? Importance, benefits and guide
-
What is cybersecurity transformation? Best practices for success
-
-
Problem Solve
How to calculate cybersecurity ROI for CEOs and boards
Calculating and communicating cybersecurity ROI can help persuade top management to invest. Here's how to use meaningful, concrete metrics that resonate with business leaders.
-
Phishing prevention: How to spot, stop and respond to scams
-
CISO burnout: How to balance leadership, pressure and sanity
-
Update Kali Linux to the latest software repository key
-
-
Manage
CISO role in ASM could add runtime security, tokenization
Runtime security and tokenization stand to play a bigger role in attack surface management, a development that could influence security leaders' responsibilities.
-
How to build a cybersecurity team to maximize business impact
-
AI in risk management: Top benefits and challenges explained
-
How CISOs can prepare for the quantum cybersecurity threat
-
Information Security Basics
-
Get Started
What is biometric authentication?
Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify their identity.
-
Get Started
An explanation of identity and access management
Identity and access management systems safeguard businesses by controlling digital identities, managing access rights and implementing security protocols.
-
Get Started
What is cybersecurity?
Cybersecurity is the practice of protecting systems, networks and data from digital threats.
Multimedia
-
News
View All -
Threats and vulnerabilities
News brief: Cyberattack trends signal security arms race
Check out the latest security news from the Informa TechTarget team.
-
Knostic wins 2024 Black Hat Startup Spotlight Competition
During a 'Shark Tank'-like final, each startup's representative spent five minutes detailing their company and product, with an additional five minutes to take questions from eight judges from Omdia, investment firms, and top companies in cyber.
-
Hackers make hay? Smart tractors vulnerable to full takeover
Hackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks to poor security in an aftermarket steering system.
Search Security Definitions
- What is biometric authentication?
- What is cybersecurity?
- What is cloud infrastructure entitlement management (CIEM)?
- What is a CISO as a service (CISOaaS)?
- What is post-quantum cryptography? Comprehensive guide
- What is a message authentication code (MAC)? How it works and best practices
- What is SIEM (security information and event management)?
- What is quantum key distribution (QKD)?