<p>Identity and access management, or IAM, is a framework of business processes, policies and technologies that facilitates the management of digital identities. With an IAM framework in place, IT security teams can control user access to critical information within their…
Category: Search Security Resources and Information from TechTarget
News brief: U.S. cyberdefenses take aim at foreign threats
<p>U.S. cyberdefenders said they are stepping up efforts to counter foreign attacks that target American citizens and companies. In recent days, the Trump administration has taken several actions against groups it blames for cyber schemes and has outlined a strategy…
How to use Netcat: Commands and use cases
<p>Netcat is arguably the most flexible network security tool available to security administrators today, and one that is valuable for any security practitioner to have in-depth knowledge of.</p> <p>Let’s take a look at how to use Netcat and explore some…
F5-CrowdStrike network security partnership: Is EDR enough?
<p>Seeking to better protect customers from exploitable network devices, F5 and CrowdStrike recently <a target=”_blank” href=”https://www.f5.com/company/news/press-releases/f5-and-crowdstrike-strengthen-web-traffic-security-with-falcon-for-f5-big-ip” rel=”noopener”>announced</a> a technology alliance in which CrowdStrike Falcon will integrate with and run directly on F5’s BIG-IP platform. This partnership will enable customers to…
How to plan an IAM program strategy
<p>A formal identity and access management strategy is crucial for every organization, as it enables security and risk management leaders to deliver their digital strategy. A recent survey revealed that simply having a well-developed written IAM strategy can increase an…
How to use Hashcat to recover passwords
<p>Ethical hacking often involves password theft. Red teams, for example, test passwords for policy weaknesses, common password use and password reuse across accounts. Blue teams test passwords for audits, compliance and digital forensics.</p> <p>In many cases, passwords retrieved by ethical…
What agentic AI means for cybersecurity
<p>Security practitioners are engaged in a battle against an enemy that sometimes seems to have all the ammunition.</p> <p>Case in point: Organizations worldwide field hundreds of millions of cyberattacks daily, according to the <a target=”_blank” href=”https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2024″ rel=”noopener”>Microsoft Digital Defense Report…
News brief: Agentic AI disrupts security, for better or worse
<p>AI agents are clocking into work. Seventy-nine percent of senior executives say their organizations are already adopting agentic AI, according to a recent <a target=”_blank” href=”https://www.pwc.com/us/en/tech-effect/ai-analytics/ai-agent-survey.html” rel=”noopener”>survey</a> by PwC, and 75% agree the technology will change the workplace more than…
How BISOs enable CISOs to scale security across the business
<p>A business information security officer is a type of senior cybersecurity executive role that aims to provide direction and leadership at the intersection of security and business interests.</p> <p>The business information security officer (BISO) is not a replacement for a…
CNAPP vs. CSPM: Comparing cloud security tools
<p>Keeping the cloud secure is becoming increasingly complex, particularly as the number of cloud deployments continues to grow. Organizations have multiple cloud security tool options to choose from, including cloud-native application protection platforms and cloud security posture management.</p> <p>In a…
News brief: Collaboration apps face security scrutiny — again
<p>Collaboration tools are a staple in the modern workforce. The keystone to getting work done, team collaboration tools such as Slack, Teams, Zoom, Trello, Notion and Google Workspace enable employees far and wide to message each other, share documents and…
To maximize their influence, CISOs need diverse skills
<p>For a long time, the main skill that CISOs needed was the ability and readiness to resign gracefully in the wake of a major cybersecurity incident. Joking aside, early CISOs did tend to have short tenures due to the distressing…
Browser detection and response fills gaps in security programs
<p>Targeted detection and response software has become a crucial component of network security. Lately, it seems that for every technology an organization uses, a dedicated detection and response tool exists to secure it — such as network detection and response,…
News brief: Nation-state threats evolve and escalate
<p>International relations might have been polite at summit meetings this week in Asia, but in cybersecurity, the global struggles proceeded as expected. Driving much of the news were tales of nation-state threat groups causing damage worldwide through breaches, <a href=”https://www.techtarget.com/whatis/feature/Common-cryptocurrency-scams”>cryptocurrency…
How to write an information security policy, plus templates
<p>CISOs and IT security leaders need well-documented information security policies that detail how the organization manages its security program, implements technologies and addresses cybersecurity threats and vulnerabilities. These policies also underscore the IT audit process by creating controls to examine…
Cybersecurity awareness news brief: What works, what doesn’t
<p>Cybersecurity Awareness Month was introduced in October 2004 by the U.S. Department of Homeland Security and the National Cybersecurity Alliance. Its initial guidance, which covered simple security tasks — such as updating antivirus twice a year, just as you would…
Cybersecurity Awareness Month: The endpoint security issue
<p>October is Cybersecurity Awareness Month, as well as awareness month for many other — arguably more important — causes, such as breast cancer, depression, domestic violence, Down syndrome and, not to be overlooked, squirrels.</p> <p>Because endpoint security continues to become…
What is data masking?
<p>Data masking is a <a href=”https://www.techtarget.com/searchsecurity/Data-security-guide-Everything-you-need-to-know”>security</a> technique that modifies sensitive data in a data set so it can be used safely in a non-production environment. Masking allows software developers, software testers, software application trainers and data analysts to work with…
CSPM vs. DSPM: Complementary security posture tools
<p>Recent years have seen the emergence of products collectively described as security posture management tools. Primarily focused on cloud environments, these tools help organizations assess controls and configuration status, mitigate threats and vulnerabilities, and protect data.</p> <p>Two popular security posture…
How single-vendor SASE can deliver better security results
<p>For many organizations, secure access service edge has become a critical initiative to modernize their network and security approaches to better support hybrid work, cloud-centric environments and generative AI application use. Yet even six years after <a href=”https://www.techtarget.com/searchnetworking/The-complete-Secure-Access-Service-Edge-SASE-guide”>SASE</a> was introduced…