<p>For decades, cybercriminals have impersonated targets’ trusted contacts to convince them to send funds, credentials or sensitive data. Thanks to deepfake and voice cloning technology, however, security awareness training — the usual countermeasure to social engineering attacks — is arguably…
Category: Search Security Resources and Information from TechTarget
Is SOAR dead or alive? Sort of
<p>”SOAR is dead,” a cybersecurity vendor recently proclaimed on its website. But the evolution of <a href=”https://www.techtarget.com/searchsecurity/definition/SOAR”>security orchestration, automation and response</a> suggests that the supposed death is more about semantics than obsolescence.</p> <p>While some companies experienced success with SOAR technology,…
The push for digital sovereignty: What CISOs need to know
<p>The French government in early 2026 announced that its 2.5 million civil servants will ditch Zoom, Microsoft Teams and other video-conferencing platforms from U.S. software makers and instead will use tech developed by its own Interministerial Directorate for Digital Affairs.</p>…
Beyond awareness: Human risk management metrics for CISOs
<p>Security decision-makers face a multipronged challenge when it comes to protecting their organizations’ systems and sensitive data.</p> <p>First, the organization’s employees pose the greatest cybersecurity risks. Beyond malicious <a href=”https://www.techtarget.com/searchsecurity/tip/Insider-threat-hunting-best-practices-and-tools”>insider threats</a>, security teams face a host of challenges from phishing…
Cybersecurity in the age of AI means bigger, faster threats
<p>With attackers able to move at AI speed, defenders can’t rely on the techniques and instincts they’ve come to trust. Even the best of best practices won’t meet the threat, said speakers at the recent SecureWorld conference in Boston.</p> <p>An…
At RSAC 2026, AI optimism and anxiety — and an MIA U.S. government
<p>According to its most ardent proponents, AI is well on its way to creating a new, nirvana-like SOC, in which exposure and threat detection windows are measured in seconds, and human operators are liberated from endless alert triage and chronic…
Inside the SOC that secured RSAC 2026 Conference
<p>Machines whirr and whizz behind the partitioned wall in the RSAC 2026 Conference expo hall. Five side-by-side monitors flash colorful alerts, charts and statistics. A dozen analysts sit around two tables, their eyes glued to sticker-covered laptops.</p> <p>It’s a glimpse…
How to roll out an enterprise passkey deployment
<p>CISOs know that the human element can be the weakest link in an enterprise’s cybersecurity defenses, often surfacing when end users create weak passwords that threat actors easily crack. Seeking a stronger alternative, security teams are increasingly turning to passkeys.</p>…
How to improve the SOC analyst experience — and why it matters
<p>Security Operations Center analysts stand on the front lines between their organizations and countless cyberthreats. How effectively an analyst reacts to any given security alert could mean the difference between a contained, minor incident and a full-on data breach.</p> <p>Too…
How contact centers detect and prevent fraud
<p>Contact center fraud is a reality that organizations must prepare for or else risk considerable losses due to security lapses in customer data protection. Successful fraud schemes can damage a brand’s reputation and result in compliance liability, especially in heavily…
News brief: Iranian cyberattacks target U.S. water, energy
<p>Geopolitical instability is a leading indicator of adversarial nation-state cybercampaigns, according to a recent <a target=”_blank” href=”https://2034462.fs1.hubspotusercontent-na1.net/hubfs/2034462/Cyber%20Operations%20Targeting%20US%20Government%20(1).pdf” rel=”noopener”>report</a> from Check Point. The analysis found that when the Caldara-Iacoviello Geopolitical Risk Index rises by more than 1 standard deviation above its…
CISO checklist: Cybersecurity platform or marketing ploy?
<p>More than 600 cybersecurity vendors crowded the RSAC 2026 Conference expo floor at the Moscone Center in San Francisco, along with their sales reps, event MCs, branded swag and multimedia displays. It amounted to an astounding commercial spectacle — but…
Next-generation firewall buyer’s guide for CISOs
<p>CISOs are well aware that next-generation firewalls protect their organizations by detecting a wide variety of security incidents, responding to cyberattacks, monitoring network activity and enforcing enterprise policies. NGFWs are also necessary when organizations embrace zero-trust architectures.<br><br>To take advantage of…
Contact center monitoring best practices for CX leaders
<p>Contact centers and their agents are a critical part of customer service. They’re the ambassadors of the organization, responding to large call volumes daily, interacting with customers and collecting feedback to pass on to the business.</p> <p>Modern contact center platforms…
RSAC 2026: Cyber insurance and the rise of ransomware
<p>John Kindervag opened his session at RSAC 2026 Conference with a compelling proposition: The advent of life insurance offered a new motivation to commit murder.</p> <p>The Forrester alumnus, who is widely credited as the creator of the zero-trust security model,…
RSAC 2026 recap: AI security and network security trends
<p>RSAC 2026 wrapped up recently in San Francisco, and to the surprise of absolutely no one, AI was the predominant topic at the show.</p> <p>On the one hand, it absolutely should have been. Organizations are charging forward with AI initiatives,…
Agentic AI’s role in amplifying and creating insider risks
<p>Agentic AI isn’t just amplifying insider risk, it’s becoming an insider risk itself. In the wake of the AI explosion, organizations must revamp their insider risk management programs — and add AI agents to their lists of identities to manage.</p>…
Identity security at RSAC 2026: The new enterprise dynamics
<p>As I was hanging out with more than 40,000 of my closest cybersecurity friends at RSAC Conference 2026 — CISOs, practitioners and vendor leaders — I learned the dominant theme was widespread adoption of AI agents. This has a variety…
Meaningful metrics demonstrate the value of cyber-resiliency
<div> <p paraeid=”{80643d30-40e9-4bc2-a7be-d78290cc9d9b}{226}” paraid=”111902967″><span style=”font-size: 12pt;”><span xml:lang=”EN-US” data-contrast=”auto”>Business leaders face daily threats to the security of their information systems – phishing attacks, DDoS attacks, viruses, ransomware and more. Many organizations have IT departments to address cybersecurity and manage threats to information systems, applications, websites networks and data. Larger enterprises likely have a security team or security operations center dedicated to preparing for, preventing and responding to…
News brief: Iran cyberattacks escalate, U.S. targets named
<p>President Donald Trump has suggested the Iran conflict could end within weeks, but his messaging remains fluid. He previously tied any potential ceasefire to reopening the Strait of Hormuz, but later said the U.S. would not get involved in negotiating…