Sharon Shea Executive Editor, TechTarget Search Security The differences between web roles and worker roles in Azure 23 Apr 2020 Search Security Zero-trust management challenges outweighed by benefits 20 Apr 2020 Search Networking SASE model aims to boost network security, performance 13 Apr 2020 Search Security Employ AI for cybersecurity, reap strong defenses faster 06 Apr 2020 Search Security How to implement a strong COVID-19 cybersecurity plan 30 Mar 2020 Search Security CISA exam preparation requires learning ethics, standards, new vocab 26 Mar 2020 Search Security CISA practice questions to prep for the exam 26 Mar 2020 Search Security How to prevent buffer overflow attacks 25 Mar 2020 Search Security Analyzing the top 2019 data breach disclosures: Hindsight in 2020 13 Mar 2020 Search Security Advanced cybersecurity fraud and how to fight it 26 Feb 2020 Search Security Security testing web applications and systems in the modern enterprise 26 Feb 2020 Search Security Software security testing and software stress testing basics 26 Feb 2020 Search Security Beat common types of cyberfraud with security awareness 10 Feb 2020 Search Security The Mirai IoT botnet holds strong in 2020 05 Feb 2020 Search Security Cryptography basics: Symmetric key encryption algorithms 28 Jan 2020 Search Security 'Computer Security Fundamentals:' Quantum security to certifications 28 Jan 2020 Search Security 7 TCP/IP vulnerabilities and how to prevent them 13 Jan 2020 Search Security CISM practice questions to prep for the exam 07 Jan 2020 Search Security The who, what, why -- and challenges -- of CISM certification 07 Jan 2020 Search Security ICS security challenges and how to overcome them 19 Dec 2019 Search Security Data breach risk factors, response model, reporting and more 17 Dec 2019 Search Security The ins and outs of cyber insurance coverage 16 Dec 2019 Search Security Comparing Diffie-Hellman vs. RSA key exchange algorithms 20 Nov 2019 Search Security Benefits of using Azure Security Center for security assessments 13 Nov 2019 Search Security Use Azure Security Center to conduct a security posture assessment 12 Nov 2019 Search Security Creating and managing a zero-trust security framework 07 Nov 2019 Search Security 4 innovative ways to remedy the cybersecurity skills gap 06 Nov 2019 Search IoT pervasive computing (ubiquitous computing) 30 Oct 2019 Search Security What are the roles and responsibilities of a liaison officer? 29 Oct 2019 Search Security On a penetration tester career path, flexibility and curiosity are key 25 Oct 2019 Search Security CompTIA PenTest+ practice test questions to assess your knowledge 24 Oct 2019 Search Security To secure DevOps, break culture and tooling barriers 07 Oct 2019 Search Security The 3 pillars of a DevSecOps model 07 Oct 2019 Search Security How to conduct proper AWS vulnerability scanning in 3 steps 19 Aug 2019 Search IoT machine-to-machine (M2M) 02 Aug 2019 Search IoT Smart streetlights build smart city network backbone 19 Jul 2019 Search IoT An in-depth look at IoT and AI 20 Jun 2019 Search IoT An IoT security maturity model for IT/OT convergence 20 Jun 2019 Search IoT IoT battery outlook: Types of batteries for IoT devices 31 May 2019 Search IoT Mitigate IoT security risks with a strong defense strategy 30 May 2019 Search IoT Hospitality IoT checks in to Royal Park Hotel 23 May 2019 Search IoT Use cases and benefits of smart sensors for IoT 30 Apr 2019 Search IoT Seven use cases of IoT for sustainability 22 Apr 2019 Search IoT Time to get prepared for IoT security issues 22 Mar 2019 Search IoT IoT in business: Deploy a successful connected enterprise 26 Feb 2019 Search IoT Editor's picks: Thought-provoking IoT blogs from 2018 02 Jan 2019 Search IoT RFID tagging 31 Dec 2018 Search IoT Use analytics in IoT projects to mine a hot commodity 26 Nov 2018 Search IoT IoT data analytics holds the key to putting data to use 26 Nov 2018 Search IoT What the union of IoT and edge computing means for IT pros 01 Nov 2018 Search IoT IoT edge computing: What's the practical potential? 01 Nov 2018 Search IoT How best to address connectivity for IoT issues 19 Oct 2018 Search IoT Z-Wave 29 Aug 2018 Search IoT Johnson Controls Smart Ready Panel equates smart stadiums to smart cities 09 Aug 2018 Search IoT What's next for industrial IoT applications, standards? 07 Aug 2018 Search IoT Overwhelmed by IIoT data? Perhaps hire a data scientist 07 Aug 2018 Search IoT At LiveWorx 2018, PTC CEO touts importance of IoT partnerships 22 Jun 2018 Search IoT The great IoT data ownership debate 23 Apr 2018 Search IoT IIC addresses industrial IoT security on endpoints 12 Mar 2018 Search IoT Particle Mesh brings mesh networking to IoT 13 Feb 2018 Search IoT Simplifying the IoT user experience and interface ... or lack thereof 08 Jan 2018 Search IoT 'Co-everything' brings the rise of the IoT partner ecosystem 08 Jan 2018 Search IoT Video analytics tools impact the bottom line 08 Jan 2018 Search IoT IoT security trends: The conversation is about to get real 08 Jan 2018 Search IoT 2018: The year AI and IoT converged 08 Jan 2018 Search IoT IoT edge analytics brings real-time intelligence to devices 08 Jan 2018 Search IoT LPWAN (low-power wide area network) 26 Sep 2017 Search IoT Domino's Pizza IoT deployment delivers temp monitoring, food safety 04 Apr 2017 Search IoT An inside look at beacon technology, manufacturers and use cases 12 Jan 2016 Search IoT IoT Agenda 23 Dec 2015 Search IoT Internet of Things security concerns prompt boost in IoT services 28 Aug 2015 Search Security Government backdoor security concerns prompt letter to president 22 May 2015 Search Security address space layout randomization (ASLR) 23 Jun 2014 Search Security Security Bytes 30 Jan 2009 1 2