New & Notable
Evaluate
2025 cloud-native cybersecurity predictions
Join Informa TechTarget's Enterprise Strategy Group analyst Melinda Marks as she looks at what 2025 has in store for cloud-native security.
News
Dozens of Chrome extensions hacked in threat campaign
Although data security vendor Cyberhaven disclosed that its Chrome extension was compromised on Dec. 24, additional research suggests the broader campaign could be months older.
Evaluate
Top 7 enterprise cybersecurity challenges in 2025
Security teams faced unprecedented challenges in 2024. The year ahead appears no less daunting. Here are the cybersecurity trends and safeguards to consider in 2025.
News
Treasury Department breached through BeyondTrust service
The Treasury Department said Chinese government hackers gained access to a key for BeyondTrust's Remote Support service and used it to breach the federal agency.
Trending Topics
-
Data Security & Privacy News
Dozens of Chrome extensions hacked in threat campaign
Although data security vendor Cyberhaven disclosed that its Chrome extension was compromised on Dec. 24, additional research suggests the broader campaign could be months older.
-
Threats & Vulnerabilities Evaluate
Top 7 enterprise cybersecurity challenges in 2025
Security teams faced unprecedented challenges in 2024. The year ahead appears no less daunting. Here are the cybersecurity trends and safeguards to consider in 2025.
-
IAM Evaluate
The basics drive 2025 identity security investments
New identity security tech might steal headlines, but Informa TechTarget's Enterprise Strategy Group analyst Todd Thiemann shows the basics get the most attention from businesses.
-
Analytics & Automation News
Microsoft enhanced Recall security, but will it be enough?
Microsoft's controversial Recall feature began rolling out to certain Windows Insiders with Copilot+ PCs in November, with more expected to participate this month.
-
Network Security Evaluate
3 network security predictions for 2025
What does 2025 have in store for network security? Analyst John Grady from Informa TechTarget's Enterprise Strategy Group shares his predictions for the upcoming year.
-
Operations & Management Manage
Add gamification learning to your pen testing training playbook
Organizations that embrace gamification in their pen testing training are better positioned to build and maintain the skilled security teams needed to address evolving threats.
Sponsored Sites
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
The basics drive 2025 identity security investments
New identity security tech might steal headlines, but Informa TechTarget's Enterprise Strategy Group analyst Todd Thiemann shows the basics get the most attention from businesses.
-
2025 cloud-native cybersecurity predictions
-
Top 7 enterprise cybersecurity challenges in 2025
-
Navigate the 2025 threat landscape with expert insights
-
-
Problem Solve
How to protect against malware as a service
Malware operators are further monetizing their malicious software by selling it to other attackers on a subscription basis. Learn how to detect and mitigate the threat.
-
How to recover from a DDoS attack
-
Biometric privacy and security challenges to know
-
How to identify and prevent insecure output handling
-
-
Manage
Add gamification learning to your pen testing training playbook
Organizations that embrace gamification in their pen testing training are better positioned to build and maintain the skilled security teams needed to address evolving threats.
-
7 DevSecOps tools to secure each step of the SDLC
-
How to mitigate wiper malware
-
8 best practices for a bulletproof IAM strategy
-
Information Security Basics
-
Get Started
What is a public key and how does it work?
In cryptography, a public key is a large numerical value that is used to encrypt data.
-
Get Started
What is a proxy firewall?
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.
-
Get Started
What is a public key certificate?
A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
Multimedia
-
News
View All -
Data security and privacy
Dozens of Chrome extensions hacked in threat campaign
Although data security vendor Cyberhaven disclosed that its Chrome extension was compromised on Dec. 24, additional research suggests the broader campaign could be months older.
-
Data security and privacy
Treasury Department breached through BeyondTrust service
The Treasury Department said Chinese government hackers gained access to a key for BeyondTrust's Remote Support service and used it to breach the federal agency.
-
Data security and privacy
10 of the biggest ransomware attacks in 2024
Ransomware attacks against U.S. organizations in 2024 disrupted healthcare systems, supply chains and government services and led to tens of millions of dollars in ransom payments.
Search Security Definitions
- What is a public key and how does it work?
- What is a proxy firewall?
- What is a public key certificate?
- What is passwordless authentication?
- What is PKI (public key infrastructure)?
- What is identity and access management? Guide to IAM
- What is a stream cipher?
- What is a block cipher?