Category: Search Security Resources and Information from TechTarget

Deepfake era demands proof-based security, not just awareness

<p>For decades, cybercriminals have impersonated targets’ trusted contacts to convince them to send funds, credentials or sensitive data. Thanks to deepfake and voice cloning technology, however, security awareness training — the usual countermeasure to social engineering attacks — is arguably…

Is SOAR dead or alive? Sort of

<p>”SOAR is dead,” a cybersecurity vendor recently proclaimed on its website. But the evolution of <a href=”https://www.techtarget.com/searchsecurity/definition/SOAR”>security orchestration, automation and response</a> suggests that the supposed death is more about semantics than obsolescence.</p> <p>While some companies experienced success with SOAR technology,…

The push for digital sovereignty: What CISOs need to know

<p>The French government in early 2026 announced that its 2.5 million civil servants will ditch Zoom, Microsoft Teams and other video-conferencing platforms from U.S. software makers and instead will use tech developed by its own Interministerial Directorate for Digital Affairs.</p>…

Beyond awareness: Human risk management metrics for CISOs

<p>Security decision-makers face a multipronged challenge when it comes to protecting their organizations’ systems and sensitive data.</p> <p>First, the organization’s employees pose the greatest cybersecurity risks. Beyond malicious <a href=”https://www.techtarget.com/searchsecurity/tip/Insider-threat-hunting-best-practices-and-tools”>insider threats</a>, security teams face a host of challenges from phishing…

Inside the SOC that secured RSAC 2026 Conference

<p>Machines whirr and whizz behind the partitioned wall in the RSAC 2026 Conference expo hall. Five side-by-side monitors flash colorful alerts, charts and statistics. A dozen analysts sit around two tables, their eyes glued to sticker-covered laptops.</p> <p>It’s a glimpse…

How to roll out an enterprise passkey deployment

<p>CISOs know that the human element can be the weakest link in an enterprise’s cybersecurity defenses, often surfacing when end users create weak passwords that threat actors easily crack. Seeking a stronger alternative, security teams are increasingly turning to passkeys.</p>…

How contact centers detect and prevent fraud

<p>Contact center fraud is a reality that organizations must prepare for or else risk considerable losses due to security lapses in customer data protection. Successful fraud schemes can damage a brand’s reputation and result in compliance liability, especially in heavily…

News brief: Iranian cyberattacks target U.S. water, energy

<p>Geopolitical instability is a leading indicator of adversarial nation-state cybercampaigns, according to a recent <a target=”_blank” href=”https://2034462.fs1.hubspotusercontent-na1.net/hubfs/2034462/Cyber%20Operations%20Targeting%20US%20Government%20(1).pdf” rel=”noopener”>report</a> from Check Point. The analysis found that when the Caldara-Iacoviello Geopolitical Risk Index rises by more than 1 standard deviation above its…

CISO checklist: Cybersecurity platform or marketing ploy?

<p>More than 600 cybersecurity vendors crowded the RSAC 2026 Conference expo floor at the Moscone Center in San Francisco, along with their sales reps, event MCs, branded swag and multimedia displays. It amounted to an astounding commercial spectacle — but…

Next-generation firewall buyer’s guide for CISOs

<p>CISOs are well aware that next-generation firewalls protect their organizations by detecting a wide variety of security incidents, responding to cyberattacks, monitoring network activity and enforcing enterprise policies. NGFWs are also necessary when organizations embrace zero-trust architectures.<br><br>To take advantage of…

Contact center monitoring best practices for CX leaders

<p>Contact centers and their agents are a critical part of customer service. They’re the ambassadors of the organization, responding to large call volumes daily, interacting with customers and collecting feedback to pass on to the business.</p> <p>Modern contact center platforms…

RSAC 2026: Cyber insurance and the rise of ransomware

<p>John Kindervag opened his session at RSAC 2026 Conference with a compelling proposition: The advent of life insurance offered a new motivation to commit murder.</p> <p>The Forrester alumnus, who is widely credited as the creator of the zero-trust security model,…

Meaningful metrics demonstrate the value of cyber-resiliency

<div> <p paraeid=”{80643d30-40e9-4bc2-a7be-d78290cc9d9b}{226}” paraid=”111902967″><span style=”font-size: 12pt;”><span xml:lang=”EN-US” data-contrast=”auto”>Business leaders face daily threats to the security of their information systems&nbsp;–&nbsp;phishing attacks,&nbsp;DDoS&nbsp;attacks, viruses,&nbsp;ransomware&nbsp;and more.&nbsp;Many organizations&nbsp;have&nbsp;IT departments&nbsp;to&nbsp;address&nbsp;cybersecurity&nbsp;and&nbsp;manage&nbsp;threats to information systems, applications,&nbsp;websites networks&nbsp;and data.&nbsp;Larger enterprises&nbsp;likely&nbsp;have&nbsp;a security team or&nbsp;security operations center&nbsp;dedicated&nbsp;to preparing for,&nbsp;preventing&nbsp;and responding to…