<p>The traditional enterprise SIEM pulls security log data from sources across the IT environment, then normalizes it, analyzes it and retains it. But because SIEM providers typically charge more to hold more data, organizations generally must retain less data than…
Category: Search Security Resources and Information from TechTarget
News brief: Security worries and warnings as AI use expands
<p>”We live in a world that could become fraught with day-to-day hazards from the misuse of AI and we need to take ownership of the problems — because the risks are real,” warned Dr. Seán Ó hÉigeartaigh, executive director of…
How to construct an effective security controls evaluation
<p>I once received an ad from a company that promised to lower home energy costs by conducting a free energy audit. The audit, it said, could be done over the phone — no home visit — and would require absolutely…
5 leading enterprise password managers to consider
<p>Enterprise password managers are must-have tools for organizations of all shapes and sizes. While consumer-based password managers are good for users’ personal lives, enterprise security and desktop administrators require more comprehensive password managers that offer greater security, control and visibility…
Claude Mythos changes the AI security threat matrix
<p>When Anthropic announced its latest large language model, Claude Mythos, the news hit with a jolt. Anthropic wasn’t putting out word that it was about to release Mythos — it wanted the world to know that it would <i>not</i> release…
Buyer’s guide for CISOs: Cloud security posture management
<p>Cloud security posture management has become a core layer of modern cloud defense because it addresses a basic but persistent problem: many cloud security incidents begin with misconfigurations, excessive privileges, unmanaged assets, weak network exposure decisions and drift from approved…
6 things to check in your cyber insurance policy fine print
<p>Cybersecurity insurance has never been a “must-have” purchase for enterprises, with many still forgoing any form of coverage. Others, however, have found it attractive as a way to hedge against the failure of their cybersecurity investments.</p> <p>Cyber insurance can help…
How cyber insurance helped with breach recovery — or not
<p>Since its emergence in the 1990s, cyber insurance has become a critical part of enterprise risk management. Initially an offshoot of errors and omissions insurance, cyber insurance coverage, which was limited in scope, swiftly matured as companies became more reliant…
News brief: Critical infrastructure, OT cybersecurity attacks
<p>The Stuxnet worm is widely recognized as the first confirmed cyberattack designed to damage critical infrastructure. Discovered in 2010 but used as early as 2009, it targeted uranium enrichment systems at Iran’s Natanz Nuclear Facility, causing physical destruction of centrifuges.</p>…
Top zero-trust use cases in the enterprise
<p>Most organizations have embraced zero trust, but many are early in their adoption journey. Yet with the rising volume, velocity and sophistication of attacks, security teams are under pressure to accelerate those journeys.</p> <p>”We’re definitely seeing higher rates of adoption…
Tape’s strategic role in modern data protection
<p>The necessity of data backup has been clear since the early days of computing. And the oldest backup method — tape — is still a viable option.</p> <p>In the past decade, tape use declined in favor of the cloud due…
What every CISO should consider before a SIEM migration
<p>No SIEM strategy, platform or service is perfect. Enterprise needs and circumstances change. Providers and offerings evolve. New options arise. Inevitably, many organizations must eventually migrate from their existing SIEMs or SIEM providers to new ones.</p> <p>Upon deciding a <a…
CISO’s guide to centralized vs. federated security models
<p>Organizational complexity, cloud adoption and distributed teams are forcing IT leaders to rethink security structures. At enterprise scale, the way security responsibilities are structured directly affects how an organization manages risk, supports innovation and responds to threats. Those established security…
What are the most common authentication methods?
<p>The state of digital user authentication today is undeniably messy. Many users rely on hundreds of authenticators, including passwords, biometrics and cryptographic keys, to have their digital identity verified by devices, applications, services and other digital entities. Adding to the…
Shadow code: The hidden threat for enterprise IT
<p>Many enterprises have a lurking threat embedded deep in their systems, and the risks to privacy and cybersecurity can be grave: shadow code.</p> <p>Shadow code is any code — libraries, scripts, APIs, and web browser plugins and extensions — that…
How to fix cybersecurity’s agentic AI identity crisis
<p>The rapid adoption of agentic AI is radically shifting how enterprises operate, automate workflows and interact with digital systems. Autonomous <a href=”https://www.techtarget.com/searchenterpriseai/definition/AI-agents”>AI agents</a> — intelligent systems that are capable of executing commands, accessing sensitive data and making decisions on behalf…
5 top SIEM use cases in the enterprise
<p>A security, incident and event management system collects, centralizes and analyzes data from across the IT environment to uncover cybersecurity and operational problems.</p> <p>As with so many formerly distinct and well-defined cybersecurity systems, “SIEM” is now as often a set…
Top 8 e-signature software providers for 2026
<p data-end=”3972″ data-start=”3847″>E-signature software is now a standard business tool for contracts, approvals and customer-facing forms.</p> <p data-end=”4203″ data-start=”3974″>Since the Electronic Signatures in Global and National Commerce, or <a href=”https://www.techtarget.com/searchsecurity/definition/Electronic-Signatures-in-Global-and-National-Commerce-Act”>ESIGN</a>, Act passed in 2000 and set <a href=”https://www.techtarget.com/searchcontentmanagement/answer/Are-electronic-signatures-legally-binding”>legal requirements for…
How do digital signatures work?
<p data-end=”5614″ data-start=”5350″>Organizations use digital signatures when an agreement needs more than convenience. They use them when a workflow requires <a href=”https://www.techtarget.com/searchcontentmanagement/answer/E-signature-vs-digital-signature-Whats-the-difference”>stronger signer verification</a>, tamper evidence and a better evidentiary trail than a basic electronic signature provides.</p> <p data-end=”5871″ data-start=”5616″>That…
News brief: AI woes continue for security leaders
<p>With nearly half the respondents in a recent survey of CIOs expressing that they wish AI had “never been invented,” at least in part because of the risks it introduces, it’s fair to say that the relationship between AI and…