Search Security Information, News and Tips from TechTarget (original) (raw)
New & Notable
Trending Topics
Data Security & Privacy Get Started
6 confidential computing use cases that secure data in use
Confidential computing bridges a critical security gap by encrypting data in use. Learn about its enterprise use cases, from AI protection to data sovereignty.
News brief: Cybersecurity weakened by government shutdown
Check out the latest security news from the Informa TechTarget team.
IAM Manage
Identity security tool sprawl: Origins and the way forward
From IGA to ITDR, identity teams juggle diverse security functions. Explore how tool proliferation affects operations and consolidation strategies.
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
Network Security Problem Solve
How to use arp-scan to discover network hosts
An arp-scan delivers a fast, focused scan of an organization's local subnet. It is not fancy, but it's an easily controlled method to learn exactly what's connected.
Operations & Management Problem Solve
Red teams and AI: 5 ways to use LLMs for penetration testing
Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing.
Sponsored Sites
Security Leading the Way in Corrections Technology From creating safer facilities to supporting stronger reentry outcomes, Aventiv, and its family of brands: Securus Technologies, Securus Monitoring and JPay, delivers technology solutions that safely and securely transform corrections environments for everyone. Learn More Artificial Intelligence Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions. Learn More Security One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources. Learn More
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Featured Authors
Find Solutions For Your Project
Evaluate
Problem Solve
Manage
Get Started
How to use Gophish to fortify security awareness training
Stop phishing attacks before they happen. Discover how Gophish simulates real threats to identify training gaps and strengthen employee awareness.
Get Started
Top 15 IT security frameworks and standards explained
Several IT security frameworks and standards exist to help protect company data. Here's advice for choosing the right ones for your organization.
Get Started
6 confidential computing use cases that secure data in use
Confidential computing bridges a critical security gap by encrypting data in use. Learn about its enterprise use cases, from AI protection to data sovereignty.
Multimedia
Videos, Podcasts, Photo Stories and Infographics
Get Started
An explanation of quantum key distribution
AI security: Top experts weigh in on the why and how
An explanation of risk management for businesses
An explanation of identity and access management
Get Started
An explanation of post-quantum cryptography
An explanation of encryption
An explanation of firewall types and uses
Ransomware: Examples, prevention and mitigating the damage
Get Started
An explanation of quantum cryptography
An explanation of purple teaming
An explanation of data breaches
The DOGE effect on cyber: What's happened and what's next?
Sections from across Search Security
News
Threat detection and response
News brief: AI's cybersecurity risks weigh on business leaders
Check out the latest security news from the Informa TechTarget team.
Threats and vulnerabilities
News brief: Cybersecurity weakened by government shutdown
Check out the latest security news from the Informa TechTarget team.
Threats and vulnerabilities
News brief: AI cybersecurity worries mount
Check out the latest security news from the Informa TechTarget team.
Search Security Definitions
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?
- What is COMSEC (communications security)?
- What is the Mitre ATT&CK framework?
- What is a CISO (chief information security officer)?
- What is biometric authentication?
- What is cloud infrastructure entitlement management (CIEM)?
- What is cybersecurity?
- What is a CISO as a service (CISOaaS)?
- What is post-quantum cryptography? Comprehensive guide
- What is a message authentication code (MAC)? How it works and best practices
- What is SIEM (security information and event management)?
- What is quantum key distribution (QKD)?