Category: Search Security Resources and Information from TechTarget

How single-vendor SASE can deliver better security results

<p>For many organizations, secure access service edge has become a critical initiative to modernize their network and security approaches to better support hybrid work, cloud-centric environments and generative AI application use. Yet even six years after <a href=”https://www.techtarget.com/searchnetworking/The-complete-Secure-Access-Service-Edge-SASE-guide”>SASE</a> was introduced…

6 steps to increase Android security in the enterprise

<p>Android phones might be a good choice for many consumers, but IT teams must test their endpoints against enterprise standards. How can IT make sure these devices measure up when it comes to corporate security?</p> <p>Android security architecture has evolved…

News brief: National cyberdefenses under mounting pressure

<p>Some experts and lawmakers warn U.S. cyberdefenses are becoming more vulnerable by the day, as nation-state threats escalate. That one-two punch could have serious implications for national security and both public- and private-sector cyber-risk.</p> <p>This week’s featured articles cover a…

What is a backup storage device?

<p>A backup storage device is a hardware component that stores duplicate copies of data. This type of auxiliary storage hardware is typically used to back up data that resides in <a href=”https://www.techtarget.com/searchstorage/definition/primary-storage”>primary storage</a>. If information in primary storage becomes unavailable…

What is antivirus software?

<p>Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other types of <a href=”https://www.techtarget.com/searchsecurity/definition/malware”>malware</a> from computers, networks and other devices. Often included as part of a security package, antivirus software can also…

What is a cloud access security broker (CASB)?

<p>A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises <a href=”https://www.techtarget.com/searchdatacenter/definition/infrastructure”>infrastructure</a> and a <a href=”https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider”>cloud provider’s</a> infrastructure. A CASB tool provides a unified and consistent method of delivering cloud security for…

How to use Gophish to fortify security awareness training

<p>Security teams constantly worry about phishing scams. Of all the social engineering attacks, phishing is the most significant and effective.</p> <p>Despite thorough guidance to help employees <a href=”https://www.techtarget.com/searchsecurity/feature/How-to-avoid-phishing-hooks-A-checklist-for-your-end-users”>avoid falling victim to phishing schemes</a> and technologies that help prevent many scams…

Your browser is an AI-enabled OS, so secure it like one

<p>From an application perspective, web browsers have become a sort of OS within an OS. With the introduction of agentic AI capabilities within the browser (just look at what <a href=”https://www.techtarget.com/searchenterpriseai/news/366629196/Perplexitys-Chrome-bid-shows-growing-competition-in-AI-search”>Perplexity</a>, Opera and, to some extent, Google and Microsoft are…

How CISOs can get out of security debt and why it matters

<p>Security debt happens when organizations allow cybersecurity weaknesses and vulnerabilities to linger and accumulate, putting them at significant, ongoing risk of compromise. At worst, security debt could set the stage for a devastating data breach. Enterprises that manage and minimize…

What CISOs should know about DeepSeek cybersecurity risks

<p>As generative AI platforms like ChatGPT and Claude become embedded in enterprise workflows, a new class of large language models from China is also gaining traction globally. Among them, <a href=”https://www.techtarget.com/whatis/feature/DeepSeek-explained-Everything-you-need-to-know”>DeepSeek</a> — an open-source, bilingual Chinese-English LLM developed by DeepSeek…

Top 15 IT security frameworks and standards explained

<p>Information security management encompasses many areas — from perimeter protection and encryption to application security and disaster recovery. IT security is made more challenging by compliance regulations and standards, such as <a href=”https://www.techtarget.com/searchhealthit/definition/HIPAA”>HIPAA</a>, PCI DSS , the Sarbanes-Oxley Act and…

Identity security tool sprawl: Origins and the way forward

<p>Identity security teams face the frequently conflicting goals of stability, agility and improved security. Identity leaders face a complex world in flux, with enterprise systems continually changing, <a href=”https://www.techtarget.com/searchsecurity/answer/What-are-some-of-the-top-identity-and-access-management-risks”>identity-driven threats increasing</a>, compliance regulations becoming more rigorous and AI-driven apps creating…

6 confidential computing use cases that secure data in use

<p>Protecting data in use — information that is being accessed, processed or modified — has traditionally been more difficult than encrypting data in motion or at rest. To address this security gap, organizations are increasingly turning to confidential computing.</p> <div…

News brief: Cybersecurity weakened by government shutdown

<p>The U.S. government shut down at 12:01 ET on Wednesday after Congress failed to reach a funding deal. Hundreds of thousands of employees across multiple federal programs have been affected — and the effects will ripple across the cybersecurity industry.</p>…

Databricks boosts data security with AI-powered suite

<p>Databricks launched Data Intelligence for Cybersecurity, a set of features and integrations aimed at enabling customers to thwart data security threats with greater accuracy.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1′)</script> </div> </div>…

What to know about 5G security threats in the enterprise

<p>Many organizations increasingly rely on 5G technologies for mobile communications, making any 5G security weaknesses of interest to attackers. The good news is that <a href=”https://www.techtarget.com/searchnetworking/tip/5G-security-Everything-you-should-know-for-a-secure-network”>5G standards have significantly improved cybersecurity</a> for mobile communications overall. Even so, threat actors inevitably…

News brief: AI cybersecurity worries mount

<p>As we enter the final quarter of 2025, two letters of the alphabet continue to dominate enterprise tech conversations and news: AI. Companies are matching all that talk with action, with 78% of organizations now using AI in at least…

7 API discovery best practices for complete visibility

<p>APIs often have access to sensitive data, making it critical for organizations to know about every single API in use. Yet many companies struggle with shadow APIs and undocumented endpoints. You can’t protect what you can’t see, making comprehensive API…