<p>Deepfake-related cybercrime is on the rise as threat actors exploit AI to deceive and defraud unsuspecting targets, including enterprise users. Deepfakes use deep learning, a category of AI that relies on neural networks, to generate synthetic image, video and audio…
Category: Search Security Resources and Information from TechTarget
Cybersecurity conferences to attend in 2026
<p>CISOs and their teams must protect their organizations’ data and networks from a constant barrage of threats and an array of vulnerabilities, while also ensuring compliance with relevant cybersecurity and industry standards, regulations, legislation and frameworks.</p> <p>To stay informed about…
How to create an incident response playbook
<p>Creating and maintaining an incident response playbook can significantly improve the speed and effectiveness of your organization’s <a href=”https://www.techtarget.com/searchsecurity/definition/incident-response”>incident response</a>. Even better, it does not require a lot of extra time and effort to build a playbook.</p> <p>To help, here’s…
News brief: AI threats to shape 2026 cybersecurity
<p>2023 was the year of AI hype. 2024 was the year of AI experimentation. 2025 was the year of AI hype correction. So, what will 2026 bring? Will the bubble burst — or maybe deflate a little? Will AI ROI…
CISO reporting structure key to strong cybersecurity outcomes
<p>Who should the chief information security officer report to? It depends on whom you ask and on what the organization wants to accomplish by having a CISO in the first place.</p> <p>That said, for the majority of organizations, it’s critical…
CISO’s guide to nonhuman identity security
<p>Nonhuman identity security has become a pressing concern as the number of machine-driven identities connecting to corporate networks continues to surge.</p> <p>According to some analysts, NHIs now exceed human accounts by factors of 10x to 50x in many organizations, especially…
Ransomware trends, statistics and facts in 2026
<p>Ransomware continues to receive attention at the highest levels of government and business — and for good reasons. It has affected people’s ability to access healthcare, put gas in their vehicles, buy groceries and protect their identities.</p> <p>The <a href=”https://www.techtarget.com/searchsecurity/tip/How-to-calculate-the-cost-of-a-data-breach”>financial…
Real-world AI voice cloning attack: A red teaming case study
<p>As an ethical hacker, I put organizations’ cyberdefenses to the test, and — like malicious threat actors — I know that social engineering remains one of the most effective methods for gaining unauthorized access to private IT environments.</p> <p>The Scattered…
5 UC and collaboration trends reshaping the market in 2026
<p>If 2024 was the year generative AI arrived, then 2025 was the year of the AI agent. Almost every vendor in the unified communications and collaboration (UCC) space released an AI-powered agent, beginning the march toward agentic AI to give…
Top web app security vulnerabilities and how to mitigate them
<p>The list of top web application security vulnerabilities and risks has remained largely unchanged for the past decade, and the attack vectors are well-known to security practitioners and developers alike. Yet these problems persist, despite their solutions being readily available…
Prepare for the 2026 threatscape with thought leaders’ insights
<p>Cybersecurity is poised for significant changes in 2026. With the rise of AI adoption, the explosion of IoT devices and the growing complexity of cloud environments, security leaders must innovate their strategies to stay ahead of emerging threats.</p> <p>Global cybercrime damages are set…
2026 guide to digital forensics tools for enterprises
<p>Digital forensics is the cornerstone of data breach investigations, enabling experts to uncover, analyze and interpret digital evidence. Businesses use digital forensics tools to conduct <a href=”https://www.techtarget.com/searchsecurity/definition/incident-response”>incident response</a> and recover data. Companies also rely on these tools to analyze how a breach…
2025 guide to digital forensics tools for enterprises
<p>Digital forensics is the cornerstone of data breach investigations, enabling experts to uncover, analyze and interpret digital evidence. Businesses use digital forensics tools to conduct <a href=”https://www.techtarget.com/searchsecurity/definition/incident-response”>incident response</a> and recover data. Companies also rely on these tools to analyze how a breach…
News brief: Browser security flaws pose growing risk
<p>Web browsers are critical gateways that enable an organization’s employees, partners and customers to access online resources, corporate systems, business applications and sensitive data, making their security a chief concern for organizations today.</p> <p>The rise of hybrid work environments, increased…
How to detect a deepfake with visual clues and AI tools
<p>Deepfakes — once the stuff of science fiction — are now so convincing that the best ones can fool even savvy end users.</p> <p>While some AI-generated content can be useful and completely benign, <a href=”https://www.techtarget.com/whatis/definition/deepfake”>deepfakes</a> — realistic, AI-generated images, video…
Android vs. iPhone: Which one is more secure?
<p>Android and iOS devices differ in a few ways, and security is one area where these differences affect organizations most.</p> <p>The choice between iPhones and Android devices has long been an issue of debate among IT departments looking to ensure…
5 network security predictions for 2026
<p>With the end of 2025 quickly approaching, it’s time to look forward to 2026 and explore some key themes security leaders should be aware of to help focus their efforts.</p> <p>In reviewing <a href=”https://www.techtarget.com/searchsecurity/opinion/Network-security-predictions-for-the-next-year”>my 2025 predictions</a>, one that exceeded my…
News brief: Future of security holds bigger budgets, new threats
<p>As the world barrels toward a new year, executives and lawmakers alike are, by turn, optimistic about the future of cybersecurity — and deeply apprehensive.</p> <p>In the SOC, for example, agentic AI promises to improve efficiency and effectiveness, enabling better…
Guide to cloud container security risks and best practices
<p>Cloud containers are a hot topic, especially in security. Technology giants Microsoft, Google and Facebook all use them. Google uses containers for everything it runs, totaling several billion each week.</p> <p>The past decade has seen containers anchoring a growing number…
Beyond the SBOM: What CISOs should know about CBOMs and HBOMs
<p>Heartbleed, SolarWinds and Log4j — the stuff of CISOs’ nightmares. As cybersecurity leaders know all too well, these historic, high-profile security breaches revealed massive weaknesses in supply chain security.</p> <p>Rising <a href=”https://www.techtarget.com/searchsecurity/tip/How-to-create-a-third-party-risk-management-policy”>awareness of third-party risk</a> has led to a surge…