New & Notable
News
Mandiant links Ivanti zero-day exploitation to Chinese hackers
Mandiant warned users to be prepared for widespread exploitation of CVE-2025-0282 as Ivanti products have become a popular target for attackers in recent years.
News
December ransomware attacks slam healthcare, public services
In December, one victim organization paid a $1.5 million ransom to restore services, while another continued to experience disruptions for more than one month following an attack.
Evaluate
Top 7 data loss prevention tools for 2025
Data loss prevention software is a necessity for most companies. Our guide gives you a quick overview of seven top DLP providers and tells you what works -- and what doesn't.
News
Critical Ivanti Connect Secure zero-day flaw under attack
Although Ivanti has seen exploitation of CVE-2025-0282 in only Ivanti Connect Secure instances, Ivanti Policy Secure and ZTA gateways are also vulnerable to the flaw.
Trending Topics
-
Data Security & Privacy News
December ransomware attacks slam healthcare, public services
In December, one victim organization paid a $1.5 million ransom to restore services, while another continued to experience disruptions for more than one month following an attack.
-
Threats & Vulnerabilities News
Mandiant links Ivanti zero-day exploitation to Chinese hackers
Mandiant warned users to be prepared for widespread exploitation of CVE-2025-0282 as Ivanti products have become a popular target for attackers in recent years.
-
IAM Evaluate
The basics drive 2025 identity security investments
New identity security tech might steal headlines, but Informa TechTarget's Enterprise Strategy Group analyst Todd Thiemann shows the basics get the most attention from businesses.
-
Analytics & Automation News
Microsoft enhanced Recall security, but will it be enough?
Microsoft's controversial Recall feature began rolling out to certain Windows Insiders with Copilot+ PCs in November, with more expected to participate this month.
-
Network Security Evaluate
3 network security predictions for 2025
What does 2025 have in store for network security? Analyst John Grady from Informa TechTarget's Enterprise Strategy Group shares his predictions for the upcoming year.
-
Operations & Management Problem Solve
Enterprise cybersecurity hygiene checklist for 2025
Enterprise cybersecurity hygiene must be a shared responsibility between employees and employers. Learn how both can get the job done with this checklist.
Sponsored Sites
-
Cybersecurity
Kaspersky Next: Cybersecurity Redefined
-
Cloud Workloads
VMware vSphere Foundation and VMware Cloud Foundation powered by Intel technology results in a unified software-defined Data Center platform for running and managing private cloud, multi-cloud, and edge containerized workloads. Built-in inferencing enables customers to efficiently turn data into insight on a flexible hybrid cloud environment.
-
Servers
Server Buying Considerations 2023
This site focusses on key server buying considerations for IT decision makers in 2023 and beyond, with an emphasis on innovations in server design, security, sustainability, automation, and financing flexibility from Dell Technologies and IntelĀ®.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Top 7 data loss prevention tools for 2025
Data loss prevention software is a necessity for most companies. Our guide gives you a quick overview of seven top DLP providers and tells you what works -- and what doesn't.
-
Data security spending in 2025: Up and to the right
-
Top 4 incident response certifications to consider in 2025
-
The basics drive 2025 identity security investments
-
-
Problem Solve
Enterprise cybersecurity hygiene checklist for 2025
Enterprise cybersecurity hygiene must be a shared responsibility between employees and employers. Learn how both can get the job done with this checklist.
-
How to protect against malware as a service
-
How to recover from a DDoS attack
-
Biometric privacy and security challenges to know
-
-
Manage
Top 15 email security best practices for 2025
Attackers exploit email every day to break into corporate networks, but the risk can be reduced by adhering to these 15 email security best practices.
-
Add gamification learning to your pen testing training playbook
-
7 DevSecOps tools to secure each step of the SDLC
-
How to mitigate wiper malware
-
Information Security Basics
-
Get Started
What is a public key and how does it work?
In cryptography, a public key is a large numerical value that is used to encrypt data.
-
Get Started
What is a proxy firewall?
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer.
-
Get Started
What is a public key certificate?
A public key certificate is a digitally signed document that serves to validate the sender's authorization and name.
Multimedia
-
News
View All -
Risk management
Experts optimistic on FCC's Cyber Trust Mark for IoT devices
The launch of the FCC's U.S. Cyber Trust Mark label for IoT devices will include internet-connected home security cameras, smart home appliances, baby monitors and more.
-
Threats and vulnerabilities
Mandiant links Ivanti zero-day exploitation to Chinese hackers
Mandiant warned users to be prepared for widespread exploitation of CVE-2025-0282 as Ivanti products have become a popular target for attackers in recent years.
-
Data security and privacy
December ransomware attacks slam healthcare, public services
In December, one victim organization paid a $1.5 million ransom to restore services, while another continued to experience disruptions for more than one month following an attack.
Search Security Definitions
- What is a public key and how does it work?
- What is a proxy firewall?
- What is a public key certificate?
- What is PKI (public key infrastructure)?
- What is passwordless authentication?
- What is identity and access management? Guide to IAM
- What is a stream cipher?
- What is a block cipher?