New & Notable
Manage
CISO's guide to implementing a cybersecurity maturity model
CISOs must both meet today's challenges and anticipate tomorrow's -- no easy feat. Cybersecurity maturity models help strategically navigate evolving threats, regulations and tech.
Evaluate
Kali vs. ParrotOS: Security-focused Linux distros compared
Network security doesn't always require expensive software. Two Linux distributions -- Kali Linux and ParrotOS -- can help enterprises fill in their security gaps.
Evaluate
Shadow AI: How CISOs can regain control in 2025 and beyond
Shadow AI threatens enterprises as employees increasingly use unauthorized AI tools. Discover the risks, governance strategies, and outlook for managing AI in today's workplace.
Get Started
How to create an SBOM: Example and free template
SBOMs provide an inventory of every component in an organization's software supply chain. Use this free downloadable SBOM template to create one for your organization.
Trending Topics
-
Data Security & Privacy Get Started
Symmetric vs. asymmetric encryption: Understand key differences
Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons.
-
Threats & Vulnerabilities Get Started
Hydra password-cracking tool: How to download and use it for good
Ethical hackers, need help brute forcing passwords? Learn how to download and use the open source Hydra password-cracking tool with this step-by-step tutorial and companion video.
-
IAM Get Started
What executives must know about nation-state threat actors
Nation-state threat actors like Russia, China, Iran and North Korea are targeting critical infrastructure and sensitive data, so executives must prepare to defend against them.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Evaluate
Zscaler delivers network, data security tools at Zenith Live
Zscaler has expanded beyond ZTNA with three strategic pillars and aims to challenge traditional security infrastructure.
-
Operations & Management Manage
CISO's guide to implementing a cybersecurity maturity model
CISOs must both meet today's challenges and anticipate tomorrow's -- no easy feat. Cybersecurity maturity models help strategically navigate evolving threats, regulations and tech.
Sponsored Sites
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
What executives must know about nation-state threat actors
Nation-state threat actors like Russia, China, Iran and North Korea are targeting critical infrastructure and sensitive data, so executives must prepare to defend against them.
-
Kali vs. ParrotOS: Security-focused Linux distros compared
-
Shadow AI: How CISOs can regain control in 2025 and beyond
-
Zscaler delivers network, data security tools at Zenith Live
-
-
Problem Solve
How AI threat detection is transforming enterprise cybersecurity
AI-powered threat detection transforms cybersecurity by using machine learning to analyze network traffic, user behaviors and data access patterns.
-
What is cyber risk quantification (CRQ)? How to get it right
-
Cybersecurity risk management: Best practices and frameworks
-
Should cybersecurity be part of your digital transformation strategy?
-
-
Manage
CISO's guide to implementing a cybersecurity maturity model
CISOs must both meet today's challenges and anticipate tomorrow's -- no easy feat. Cybersecurity maturity models help strategically navigate evolving threats, regulations and tech.
-
CISO's guide to building a strong cyber-resilience strategy
-
What a smart contract audit is, and how to conduct one
-
How to craft an effective AI security policy for enterprises
-
Information Security Basics
-
Get Started
What executives must know about nation-state threat actors
Nation-state threat actors like Russia, China, Iran and North Korea are targeting critical infrastructure and sensitive data, so executives must prepare to defend against them.
-
Get Started
What is an advanced persistent threat (APT)?
An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
-
Get Started
How to create an SBOM: Example and free template
SBOMs provide an inventory of every component in an organization's software supply chain. Use this free downloadable SBOM template to create one for your organization.
Multimedia
-
News
View All -
Security operations and management
News brief: Gartner Security and Risk Management Summit recap
Check out the latest security news from the Informa TechTarget team.
-
Security operations and management
News brief: CISA and partners face budget overhauls, cuts
Check out the latest security news from the Informa TechTarget team.
-
Data security and privacy
News brief: Week's top breaches stem from third-party attacks
Check out the latest security news from the Informa TechTarget team.
Search Security Definitions
- What is an advanced persistent threat (APT)?
- What is HMAC (Hash-Based Message Authentication Code)?
- What is operational risk?
- What is cyber extortion?
- What is the WannaCry ransomware attack?
- What is a chief risk officer (CRO)? A detailed CRO job description
- What is a next-generation firewall (NGFW)?
- What is a time-based one-time password?