Search Security Information, News and Tips from TechTarget (original) (raw)
New & Notable
News
10 of the biggest ransomware attacks in 2024
Ransomware attacks against U.S. organizations in 2024 disrupted healthcare systems, supply chains and government services and led to tens of millions of dollars in ransom payments.
Evaluate
3 network security predictions for 2025
What does 2025 have in store for network security? Analyst John Grady from Informa TechTarget's Enterprise Strategy Group shares his predictions for the upcoming year.
Trending Topics
Treasury Department breached through BeyondTrust service
The Treasury Department said Chinese government hackers gained access to a key for BeyondTrust's Remote Support service and used it to breach the federal agency.
Threats & Vulnerabilities Evaluate
Navigate the 2025 threat landscape with expert insights
AI technology and company employees can serve as both gateways and buffers against cyberthreats. Learn more from expert thought leaders on how to protect your environment in 2025.
IAM Evaluate
Identity and access management tools and features for 2025
The IAM tool marketplace is complex and ever-changing. Learn about key features and how to discern what your organization needs before approaching potential providers.
Microsoft enhanced Recall security, but will it be enough?
Microsoft's controversial Recall feature began rolling out to certain Windows Insiders with Copilot+ PCs in November, with more expected to participate this month.
Network Security Evaluate
3 network security predictions for 2025
What does 2025 have in store for network security? Analyst John Grady from Informa TechTarget's Enterprise Strategy Group shares his predictions for the upcoming year.
Operations & Management Manage
Add gamification learning to your pen testing training playbook
Organizations that embrace gamification in their pen testing training are better positioned to build and maintain the skilled security teams needed to address evolving threats.
Featured Authors
Find Solutions For Your Project
Evaluate
Problem Solve
Manage
Get Started
What is a proxy firewall?
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.
Get Started
What is a public key and how does it work?
In cryptography, a public key is a large numerical value that is used to encrypt data.
Get Started
What is a public key certificate?
A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
Multimedia
Sections from across Search Security
News
Data security and privacy
Treasury Department breached through BeyondTrust service
The Treasury Department said Chinese government hackers gained access to a key for BeyondTrust's Remote Support service and used it to breach the federal agency.
Data security and privacy
10 of the biggest ransomware attacks in 2024
Ransomware attacks against U.S. organizations in 2024 disrupted healthcare systems, supply chains and government services and led to tens of millions of dollars in ransom payments.
Data security and privacy
10 of the biggest cybersecurity stories of 2024
Some of the biggest stories of the year include a massive IT outage, a record-setting ransom payment and devastating breaches at several U.S. telecommunications companies.
Search Security Definitions
- What is a public key and how does it work?
- What is a proxy firewall?
- What is a public key certificate?
- What is passwordless authentication?
- What is PKI (public key infrastructure)?
- What is identity and access management? Guide to IAM
- What is a block cipher?
- What is a stream cipher?
- What is a session key?
- What is cipher block chaining (CBC)?
- What is user authentication?
- What is obfuscation and how does it work?
- What is IPsec (Internet Protocol Security)?
- What is Extensible Authentication Protocol (EAP)?
- What is endpoint detection and response (EDR)?
- What is Common Vulnerabilities and Exposures (CVE)?