New & Notable
Evaluate
What to know about 5G security threats in the enterprise
Learn about key 5G security threats facing enterprises, plus practical defense strategies for CISOs.
News
News brief: AI cybersecurity worries mount
Check out the latest security news from the Informa TechTarget team.
Manage
7 API discovery best practices for complete visibility
Secure your API landscape with these API discovery best practices spanning the entire SDLC. Find hidden endpoints, audit integrations and monitor continuously.
Manage
8 best practices for securing RESTful APIs
The REST architectural style helps applications communicate with each other. Be sure RESTful APIs have the protections necessary to keep attackers at bay.
Trending Topics
-
Data Security & Privacy News
News brief: Salesloft Drift breach update and timeline
Check out the latest security news from the Informa TechTarget team.
-
Threats & Vulnerabilities Evaluate
What to know about 5G security threats in the enterprise
Learn about key 5G security threats facing enterprises, plus practical defense strategies for CISOs.
-
IAM Manage
How liveness detection catches deepfakes and spoofing attacks
Biometric liveness detection can stop fake users in their tracks. Learn how the technology works to distinguish real humans from deepfakes and other spoofing attacks.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Problem Solve
How to use arp-scan to discover network hosts
An arp-scan delivers a fast, focused scan of an organization's local subnet. It is not fancy, but it's an easily controlled method to learn exactly what's connected.
-
Operations & Management Problem Solve
Red teams and AI: 5 ways to use LLMs for penetration testing
Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing.
Sponsored Sites
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Security
Leading the Way in Corrections Technology
From creating safer facilities to supporting stronger reentry outcomes, Aventiv, and its family of brands: Securus Technologies, Securus Monitoring and JPay, delivers technology solutions that safely and securely transform corrections environments for everyone.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
What to know about 5G security threats in the enterprise
Learn about key 5G security threats facing enterprises, plus practical defense strategies for CISOs.
-
Positive vs. negative security: Choosing an AppSec model
-
CISO's guide to security vendor consolidation
-
Cyber Trust Mark certification and how IoT devices will qualify
-
-
Problem Solve
How to use arp-scan to discover network hosts
An arp-scan delivers a fast, focused scan of an organization's local subnet. It is not fancy, but it's an easily controlled method to learn exactly what's connected.
-
How to use Masscan for high-speed port scanning
-
How to use Netdiscover to map and troubleshoot networks
-
Red teams and AI: 5 ways to use LLMs for penetration testing
-
-
Manage
7 key types of application security testing
Modern application development moves at unprecedented speed. Is your security testing keeping pace so that apps are secure when they reach production?
-
7 API discovery best practices for complete visibility
-
8 best practices for securing RESTful APIs
-
How AI malware works and how to defend against it
-
Information Security Basics
-
Get Started
What is a stealth virus and how does it work?
A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.
-
Get Started
Cyber Trust Mark certification and how IoT devices will qualify
The U.S. Cyber Trust Mark aims to validate IoT devices that meet a certain security threshold. Explore key NIST recommendations informing certification requirements.
-
Get Started
What is file integrity monitoring (FIM)?
File Integrity Monitoring (FIM) is a security process that continuously monitors and analyzes the integrity of an organization's assets by comparing them against a trusted baseline to detect unauthorized changes or suspicious activity.
Multimedia
-
Get Started
An explanation of quantum key distribution
-
Get Started
An explanation of post-quantum cryptography
-
Get Started
An explanation of quantum cryptography
-
News
View All -
Threats and vulnerabilities
News brief: AI cybersecurity worries mount
Check out the latest security news from the Informa TechTarget team.
-
Threats and vulnerabilities
News brief: KillSec, Yurei score successful ransomware attacks
Check out the latest security news from the Informa TechTarget team.
-
Data security and privacy
News brief: Salesloft Drift breach update and timeline
Check out the latest security news from the Informa TechTarget team.
Search Security Definitions
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?
- What is COMSEC (communications security)?
- What is the Mitre ATT&CK framework?
- What is a CISO (chief information security officer)?