New & Notable

Manage

How to prevent a data breach: 11 best practices and tactics

When it comes to data breach prevention, the stakes are high. While it's impossible to eliminate the risk, organizations can minimize it by following these best practices.

News

News brief: China-linked APTs and Russian access broker

Check out the latest security news from the Informa TechTarget team.

Manage

How to create a strong passphrase, with examples

Passphrases have emerged as an effective way to protect networks from brute-force attacks. But users still need to know how to create a passphrase that's effective.

Evaluate

What the $32B Google-Wiz deal says about cloud-native security

Google's acquisition of Wiz for $32 billion highlights the importance of cloud-native security as organizations transition to microservices and containerization.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is a hacker?

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Get Started

    WAF

    A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats.

  • Get Started

    buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security