Category: Search Security Resources and Information from TechTarget

Positive vs. negative security: Choosing an AppSec model

<p>An effective application security model is essential to protecting apps from threats and vulnerabilities. Two common models are positive security and negative security. While both approaches secure applications, they do so in different ways.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad…

CISO’s guide to security vendor consolidation

<p>There’s a staggering array of cybersecurity vendors in the market today. Like with all security controls and tools, CISOs should assess whether they need every vendor they use currently — and might use in the future.</p> <div class=”ad-wrapper ad-embedded”> <div…

Cybersecurity tech and vendor rationalization

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: Cybersecurity tech and vendor rationalization

What is a standard operating procedure (SOP)?

<p>A standard operating procedure is a set of step-by-step instructions for performing a routine activity. SOPs should be followed the same way every time to guarantee that the organization remains consistent and complies with industry regulations and business standards.</p> <div…

News brief: U.S. Cyber Trust Mark update and how to prepare

<p>We live in a connected world. And while smart televisions, kitchen appliances, security cameras, baby monitors, robot vacuums, lawnmowers and fitness trackers make life undeniably more convenient, they also enable threat actors to virtually access users’ homes — and possibly…

Is storage the weak link in your cyber-resilience strategy?

<p>With the knowledge that a large-scale cyberattack is more a case of “when” than “if,” organizations require a comprehensive cyber-resiliency strategy. Since attacks such as ransomware are squarely targeting an organization’s data, this brings the data — and storage infrastructure…

Cyber Trust Mark certification and how IoT devices qualify

<p>Consumer IoT device manufacturers have been gearing up to participate in an FCC program — the U.S. Cyber Trust Mark — that certifies they engineered their products to meet certain cybersecurity standards. The voluntary initiative is designed to validate the…

What Android security threats should IT know about?

<p>From OS vulnerabilities to ransomware attacks, Android devices continue to face a variety of security risks. As soon as Google fixes one problem, another threat comes along.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…

What is information security (infosec)?

<p>Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information. It involves the processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction and unauthorized…

What is Triple DES and why is it disallowed?

<p>Triple Data Encryption Algorithm was used widely across many industries and in many popular network protocols to encrypt data at rest and data in motion. NIST deprecated the algorithm in 2018 and disallowed its use after 2023.</p> <div class=”ad-wrapper ad-embedded”>…

An introduction to AWS IAM and security best practices

<p>IT teams must ensure that only known and trusted users can access their organization’s vital applications and data.</p> <p>Identity and access management (IAM) continues to be top of mind for businesses, especially with the popularity of AI. Machine identities vastly…

What is network security? Definition and best practices

<p>Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. It involves a combination of tools, policies, protocols and practices designed to prevent unauthorized access, misuse, modification or denial of…

How to use Masscan for high-speed port scanning

<p>Port scanners are important tools that enable administrators and security personnel — and malicious actors — to identify open and listening services on a network and, therefore, determine potential entry points into computers.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”>…

Compare Azure Government vs. Azure’s commercial cloud

<p>For U.S. government agents and contractors, two flavors of Microsoft’s cloud platform are available: Azure Government and the general-purpose commercial cloud, Microsoft Azure. But which flavor will your organization prefer?</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div…

How AI malware works and how to defend against it

<p>Malicious actors continuously tweak their tools, techniques and tactics to bypass cyberdefenses and perform successful cyberattacks. Today, the focus is on AI, with threat actors finding ways to integrate this powerful technology into their toolkits.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage”…

How to use Netdiscover to map and troubleshoot networks

<p>Network admins, security admins and support technicians need tools that quickly map the network infrastructure to display nodes, network devices and segment boundaries. Delivering continuously updated results, Netdiscover is an excellent and flexible option to uncover live hosts on a…

What is PHI breach (protected health information breach)?

<p>A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. In the U.S., personal health information (<a href=”https://www.techtarget.com/searchhealthit/definition/personal-health-information”>PHI</a>) — whether in electronic, paper…

Red teams and AI: 5 ways to use LLMs for penetration testing

<p>Large language models, such as ChatGPT, Gemini and Claude, are redefining how people obtain information and perform their daily tasks. The cybersecurity industry is no different. Teams are using LLMs for everything from security operations center automation to defending against…

Red vs. blue vs. purple team: What are the differences?

<p>Cybersecurity team exercises involve red, blue and purple teams working in tandem to test cyberdefenses, identify vulnerabilities and weaknesses, and improve an organization’s security posture.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…