Sharon Shea Executive Editor, TechTarget Security How to implement a strong COVID-19 cybersecurity plan 30 Mar 2020 Security CISA exam preparation requires learning ethics, standards, new vocab 26 Mar 2020 Security CISA practice questions to prep for the exam 26 Mar 2020 Security How to prevent buffer overflow attacks 25 Mar 2020 Security Analyzing the top 2019 data breach disclosures: Hindsight in 2020 13 Mar 2020 Security Advanced cybersecurity fraud and how to fight it 26 Feb 2020 Security Security testing web applications and systems in the modern enterprise 26 Feb 2020 Security Software security testing and software stress testing basics 26 Feb 2020 Security Beat common types of cyberfraud with security awareness 10 Feb 2020 Security The Mirai IoT botnet holds strong in 2020 05 Feb 2020 Security Cryptography basics: Symmetric key encryption algorithms 28 Jan 2020 Security 'Computer Security Fundamentals:' Quantum security to certifications 28 Jan 2020 Security 7 TCP/IP vulnerabilities and how to prevent them 13 Jan 2020 Security CISM practice questions to prep for the exam 07 Jan 2020 Security The who, what, why -- and challenges -- of CISM certification 07 Jan 2020 Security ICS security challenges and how to overcome them 19 Dec 2019 Security Data breach risk factors, response model, reporting and more 17 Dec 2019 Security The ins and outs of cyber insurance coverage 16 Dec 2019 Security Comparing Diffie-Hellman vs. RSA key exchange algorithms 20 Nov 2019 Security Benefits of using Azure Security Center for security assessments 13 Nov 2019 Security Use Azure Security Center to conduct a security posture assessment 12 Nov 2019 Security Creating and managing a zero-trust security framework 07 Nov 2019 Security 4 innovative ways to remedy the cybersecurity skills gap 06 Nov 2019 IoT Agenda pervasive computing (ubiquitous computing) 30 Oct 2019 Security What are the roles and responsibilities of a liaison officer? 29 Oct 2019 Security On a penetration tester career path, flexibility and curiosity are key 25 Oct 2019 Security CompTIA PenTest+ practice test questions to assess your knowledge 24 Oct 2019 Security 6 different types of hackers, from black hat to red hat 21 Oct 2019 Security To secure DevOps, break culture and tooling barriers 07 Oct 2019 Security The 3 pillars of a DevSecOps model 07 Oct 2019 Security How to conduct proper AWS vulnerability scanning in 3 steps 19 Aug 2019 IoT Agenda machine-to-machine (M2M) 02 Aug 2019 IoT Agenda Smart streetlights build smart city network backbone 19 Jul 2019 IoT Agenda An in-depth look at IoT and AI 20 Jun 2019 IoT Agenda An IoT security maturity model for IT/OT convergence 20 Jun 2019 IoT Agenda IoT battery outlook: Types of batteries for IoT devices 31 May 2019 IoT Agenda Mitigate IoT security risks with a strong defense strategy 30 May 2019 IoT Agenda Hospitality IoT checks in to Royal Park Hotel 23 May 2019 IoT Agenda Use cases and benefits of smart sensors for IoT 30 Apr 2019 IoT Agenda Seven use cases of IoT for sustainability 22 Apr 2019 IoT Agenda Time to get prepared for IoT security issues 22 Mar 2019 IoT Agenda IoT in business: Deploy a successful connected enterprise 26 Feb 2019 IoT Agenda Editor's picks: Thought-provoking IoT blogs from 2018 02 Jan 2019 IoT Agenda microcomputer 31 Dec 2018 IoT Agenda RFID tagging 31 Dec 2018 IoT Agenda Use analytics in IoT projects to mine a hot commodity 26 Nov 2018 IoT Agenda IoT data analytics holds the key to putting data to use 26 Nov 2018 IoT Agenda What the union of IoT and edge computing means for IT pros 01 Nov 2018 IoT Agenda IoT edge computing: What's the practical potential? 01 Nov 2018 IoT Agenda How best to address connectivity for IoT issues 19 Oct 2018 IoT Agenda Z-Wave 29 Aug 2018 IoT Agenda Johnson Controls Smart Ready Panel equates smart stadiums to smart cities 09 Aug 2018 IoT Agenda What's next for industrial IoT applications, standards? 07 Aug 2018 IoT Agenda Overwhelmed by IIoT data? Perhaps hire a data scientist 07 Aug 2018 IoT Agenda At LiveWorx 2018, PTC CEO touts importance of IoT partnerships 22 Jun 2018 IoT Agenda The great IoT data ownership debate 23 Apr 2018 IoT Agenda IIC addresses industrial IoT security on endpoints 12 Mar 2018 IoT Agenda Particle Mesh brings mesh networking to IoT 13 Feb 2018 IoT Agenda Simplifying the IoT user experience and interface ... or lack thereof 08 Jan 2018 IoT Agenda 'Co-everything' brings the rise of the IoT partner ecosystem 08 Jan 2018 IoT Agenda Video analytics tools impact the bottom line 08 Jan 2018 IoT Agenda IoT security trends: The conversation is about to get real 08 Jan 2018 IoT Agenda 2018: The year AI and IoT converged 08 Jan 2018 IoT Agenda IoT edge analytics brings real-time intelligence to devices 08 Jan 2018 IoT Agenda LPWAN (low-power wide area network) 26 Sep 2017 IoT Agenda Domino's Pizza IoT deployment delivers temp monitoring, food safety 04 Apr 2017 IoT Agenda An inside look at beacon technology, manufacturers and use cases 12 Jan 2016 IoT Agenda IoT Agenda 23 Dec 2015 IoT Agenda Internet of Things security concerns prompt boost in IoT services 28 Aug 2015 Security Government backdoor security concerns prompt letter to president 22 May 2015 Security address space layout randomization (ASLR) 23 Jun 2014 Security Security Bytes 30 Jan 2009 1 2