Category: Search Security Resources and Information from TechTarget

Secure MCP servers to safeguard AI and corporate data

<p>The deployment of AI for business use cases has become a major enterprise priority. But to reap AI’s potentially game-changing productivity and innovation benefits, organizations must connect large language models to their internal data and services. Enter Model Context Protocol…

Why organizations need cloud attack surface management

<div> <div> <p paraeid=”{391f7bcb-7164-4bda-b387-679b7c275a0e}{29}” paraid=”781871645″><span xml:lang=”EN-US” data-contrast=”auto”>As more organizations move to public cloud environments, they’re finding that their attack surfaces are no longer fixed perimeters but instead a constantly shifting collection of services, identities, APIs and configurations. Traditional security tools,…

Top 7 reasons incident response plans fail

<p>Like the best-laid plans of mice and men, even the best-intentioned cybersecurity <a href=”https://www.techtarget.com/searchsecurity/definition/incident-response”>incident response</a> plans can go awry. When they do, the consequences can be ugly, as many organizations have discovered in recent years.</p> <p>A 2025 survey of 1,700…

Top 19 contact center platforms of 2026

<p>Contact center software has existed since the dawn of digital contact centers decades ago. But, in recent years, the contact center software industry has changed significantly.</p> <p>New technologies, such as generative AI, have spawned powerful and innovative contact center features.…

Top open source and commercial threat intelligence feeds

<p>Cybersecurity threat intelligence feeds play an important role in security. They detail current attacks and their sources. These characteristics, better known as <a href=”https://www.techtarget.com/searchsecurity/definition/Indicators-of-Compromise-IOC”>indicators of compromise</a>, include, among other factors, IP addresses, domain names, URLs, email addresses, malware file hashes…

10 must-have security technologies in 2026

<p>The ever-evolving threat landscape looks particularly ominous to security executives scanning the 2026 horizon.</p> <p>CISOs and their teams are bracing for more sophisticated, challenging and targeted <a href=”https://www.techtarget.com/searchsecurity/feature/AI-powered-attacks-What-CISOSs-need-to-know-now”>AI-enabled cyberattacks</a>. They’re anticipating more geopolitically motivated attacks. And they’re seeing their organizations’…

Quantifying cyber risk at Netflix, Highmark Health: Case studies

<p>In 2019, CISO Omar Khawaja set out to transform the compliance-driven security culture at Highmark Health — a nonprofit healthcare company based in Pittsburgh — to one focused on business outcomes and risk.</p> <p>Khawaja turned to the <a href=”https://www.techtarget.com/searchsecurity/tip/Using-the-FAIR-model-to-quantify-cyber-risk”>Factor Analysis…

5 deepfake detection tools to protect enterprise users

<p>As tools to create deepfakes become more sophisticated, affordable and accessible, CISOs should prepare for a growing number of <a href=”https://www.techtarget.com/searchsecurity/tip/Real-world-AI-voice-cloning-attack-A-red-teaming-case-study”>social engineering attacks that hinge on fraudulent audio and video</a>. In the coming months and years, many enterprise end users…

Cybersecurity and business needs: A CISO’s 2026 outlook

<p>CISOs have a lot on their plate — and it’s only going to get fuller in the coming year.</p> <p>The role traditionally defined as a threat defender <a href=”https://www.techtarget.com/searchsecurity/tip/The-CISO-evolution-From-security-gatekeeper-to-strategic-leader”>has evolved</a> to include that of a business strategist. Where once CISOs…

5 steps to ensure HIPAA compliance on mobile devices

<p>Complying with <a href=”https://www.techtarget.com/searchhealthit/definition/HIPAA”>HIPAA</a> on mobile devices is no longer just a technical exercise. As smartphones and tablets become part of everyday clinical workflows, organizations must be able to demonstrate who can access protected health information, under what conditions and…

5 steps to approach BYOD compliance policies

<p>Endpoint usage policies must evolve as user behavior, device ownership models and regulatory expectations continue to shift. BYOD endpoints present especially complicated challenges for organizations, which have to ensure all endpoints meet data privacy and security regulations, despite not owning…

10 cybersecurity trends to watch in 2026

<p>As cybersecurity leaders begin 2026, they face yet another year of escalations. The attack surfaces they defend are becoming bigger and more complex, while the risks and threats facing their organizations are increasing in volume, velocity and sophistication.</p> <p>It’s a…

18 enterprise email security best practices for 2026

<p>Email security best practices haven’t changed much over the years: Use strong passwords, block spam, don’t trust offers that seem too good to be true and verify requests — even from known entities.</p> <p>These longstanding practices, however, have not stopped…

Top 8 cybersecurity predictions for 2026

<p>Look into our cybersecurity crystal ball for the rest of 2026, and you probably won’t be surprised to see a familiar acronym appear: AI.</p> <p>What’s new this year is that — three years after ChatGPT first burst into public consciousness…

Use the CIA triad to shape security automation use cases

<p>Many IT automation and orchestration discussions focus on using pipelines that enable continuous integration/continuous delivery to improve IT productivity and efficiency. While these pipelines benefit service and software development, they can also bolster an organization’s security posture.</p> <p>It’s helpful to…

News brief: Security flaws put thousands of systems at risk

<p>The number of reported vulnerabilities <a target=”_blank” href=”https://www.darkreading.com/cybersecurity-analytics/vulnerabilities-surge-messy-reporting-blurs-picture” rel=”noopener”>reached an all-time high in 2025</a>, according to the National Vulnerability Database, with more than 48,000 new CVEs.</p> <p>The good news is that, according to experts, the increase likely reflects more thorough…

10 important incident response metrics and how to use them

<p>Incident response metrics help an organization assess its ability to deal with cybersecurity incidents effectively, quickly and responsibly. Where response efforts are inadequate, metrics can help cybersecurity teams and corporate leadership pinpoint what needs to change.</p> <p>If an organization only…

Vibe coding security risks and how to mitigate them

<p>Vibe coding — using generative AI to help write code — has gained traction as developers tap into AI to build software. Rather than hand-code every line of logic, developers interact with AI systems using natural language and iterative adjustment.</p>…