Search Security Information, News and Tips from TechTarget (original) (raw)

New & Notable

6 confidential computing use cases that secure data in use

Confidential computing bridges a critical security gap by encrypting data in use. Learn about its enterprise use cases, from AI protection to data sovereignty.

News brief: Cybersecurity weakened by government shutdown

Check out the latest security news from the Informa TechTarget team.

Identity security tool sprawl: Origins and the way forward

From IGA to ITDR, identity teams juggle diverse security functions. Explore how tool proliferation affects operations and consolidation strategies.

Change is in the wind for SecOps: Are you ready?

Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.

How to use arp-scan to discover network hosts

An arp-scan delivers a fast, focused scan of an organization's local subnet. It is not fancy, but it's an easily controlled method to learn exactly what's connected.

Red teams and AI: 5 ways to use LLMs for penetration testing

Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing.

Security Leading the Way in Corrections Technology From creating safer facilities to supporting stronger reentry outcomes, Aventiv, and its family of brands: Securus Technologies, Securus Monitoring and JPay, delivers technology solutions that safely and securely transform corrections environments for everyone. Learn More Artificial Intelligence Intel & Red Hat: Leading the way in Enterprise AI Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions. Learn More Security One Identity | Integrated Cybersecurity for all Your Identities Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources. Learn More

Topics Covered

Find Solutions For Your Project

How to use Gophish to fortify security awareness training

Stop phishing attacks before they happen. Discover how Gophish simulates real threats to identify training gaps and strengthen employee awareness.

Top 15 IT security frameworks and standards explained

Several IT security frameworks and standards exist to help protect company data. Here's advice for choosing the right ones for your organization.

6 confidential computing use cases that secure data in use

Confidential computing bridges a critical security gap by encrypting data in use. Learn about its enterprise use cases, from AI protection to data sovereignty.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Get Started

An explanation of quantum key distribution

Get Started

An explanation of post-quantum cryptography

Get Started

An explanation of quantum cryptography

Sections from across Search Security

View All

News brief: AI's cybersecurity risks weigh on business leaders

Check out the latest security news from the Informa TechTarget team.

News brief: Cybersecurity weakened by government shutdown

Check out the latest security news from the Informa TechTarget team.

News brief: AI cybersecurity worries mount

Check out the latest security news from the Informa TechTarget team.

Search Security Definitions

View All Definitions