Search Security Information, News and Tips from TechTarget (original) (raw)

New & Notable

News

10 of the biggest ransomware attacks in 2024

Ransomware attacks against U.S. organizations in 2024 disrupted healthcare systems, supply chains and government services and led to tens of millions of dollars in ransom payments.

Evaluate

3 network security predictions for 2025

What does 2025 have in store for network security? Analyst John Grady from Informa TechTarget's Enterprise Strategy Group shares his predictions for the upcoming year.

Treasury Department breached through BeyondTrust service

The Treasury Department said Chinese government hackers gained access to a key for BeyondTrust's Remote Support service and used it to breach the federal agency.

AI technology and company employees can serve as both gateways and buffers against cyberthreats. Learn more from expert thought leaders on how to protect your environment in 2025.

Identity and access management tools and features for 2025

The IAM tool marketplace is complex and ever-changing. Learn about key features and how to discern what your organization needs before approaching potential providers.

Microsoft enhanced Recall security, but will it be enough?

Microsoft's controversial Recall feature began rolling out to certain Windows Insiders with Copilot+ PCs in November, with more expected to participate this month.

3 network security predictions for 2025

What does 2025 have in store for network security? Analyst John Grady from Informa TechTarget's Enterprise Strategy Group shares his predictions for the upcoming year.

Add gamification learning to your pen testing training playbook

Organizations that embrace gamification in their pen testing training are better positioned to build and maintain the skilled security teams needed to address evolving threats.

Find Solutions For Your Project

What is a proxy firewall?

A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.

What is a public key and how does it work?

In cryptography, a public key is a large numerical value that is used to encrypt data.

What is a public key certificate?

A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.

View All Get Started

Multimedia

Sections from across Search Security

View All

Treasury Department breached through BeyondTrust service

The Treasury Department said Chinese government hackers gained access to a key for BeyondTrust's Remote Support service and used it to breach the federal agency.

10 of the biggest ransomware attacks in 2024

Ransomware attacks against U.S. organizations in 2024 disrupted healthcare systems, supply chains and government services and led to tens of millions of dollars in ransom payments.

10 of the biggest cybersecurity stories of 2024

Some of the biggest stories of the year include a massive IT outage, a record-setting ransom payment and devastating breaches at several U.S. telecommunications companies.

Search Security Definitions

View All Definitions