<p>Microsoft positions Azure Local as an evolution in hybrid cloud. While analysts say the vision is bold, questions remain about ease of deployment and long-term fit for the enterprise.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″…
Category: Search Security Resources and Information from TechTarget
Use an AI gateway to secure AI models and applications
<p>AI application development has rapidly gone from curiosity to enterprise imperative. Yet, given the type of data AI agents, large language models and applications access, it is critical to implement the proper security controls.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad…
Identity and data security themes at Black Hat 2025
<p>If you were one of the 20,000 attendees at <a href=”https://www.techtarget.com/searchsecurity/conference/Guide-to-the-latest-Black-Hat-Conference-news”>Black Hat 2025</a> in the 103-degree heat of Las Vegas, I hope you’ve recovered. For those of you who could not attend or want to get a perspective on the…
Use ssh-keygen to generate new key pairs: A full tutorial
<p>SSH is a secure way to log into remote systems, but you can improve its security by using it to authenticate communicating hosts through the exchange of public keys — that is, generating a key pair using the <span style=”font-family:…
An explanation of quantum key distribution
<p><i>In this video, Informa TechTarget managing editor Kate Murray explains how quantum key distribution uses physics principles to create more secure cryptographic keys that classic computing can’t hack.</i></p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad…
News brief: Rising OT threats put critical infrastructure at risk
<p>One of the most notorious ransomware incidents in history happened in May 2021, when malicious hackers held the Colonial Pipeline hostage, causing gas shortages and widespread panic. The high-profile incident underscored the vulnerability of U.S. critical infrastructure and operational technology…
SSH tunneling explained: A tutorial on SSH port forwarding
<p>The <a href=”https://www.techtarget.com/searchsecurity/definition/Secure-Shell”>Secure Shell</a> protocol defines a mechanism for securely connecting to a remote host. SSH replaced <a href=”https://www.techtarget.com/searchnetworking/definition/Telnet”>Telnet</a>, the original internet application for running remote login sessions.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad…
How to write a data classification policy, with template
<p>Organizations churn out vast amounts of data every day. Those without defined data classification processes risk not knowing where their data resides or if it’s properly protected.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…
How to remove digital signatures from a PDF
<p>As a result of digital transformation, organizations increasingly use digital signatures in place of handwritten signatures.</p> <p>Organizations can use authenticated — those certified by a certificate authority (<a href=”https://www.techtarget.com/searchsecurity/definition/certificate-authority”>CA</a>) — or nonauthenticated digital signatures to create legally binding agreements. However,…
What is governance, risk and compliance (GRC)?
<p>Governance, risk and compliance (GRC) refers to an organization’s strategy, or framework, for handling the interdependencies of the following three components:</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div> </div> <ol type=”1″ start=”1″…
The latest from Black Hat USA 2025
<p>Black Hat USA 2025 is returning for its 28th year, covering the latest in infosec for technical experts, thought leaders, innovative vendors and cybersecurity pros.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…
How to use Nmap to scan ports: A complete tutorial
<p>Ask any security, network or systems administrator about the top tools in their toolbox and Nmap is likely on their list. Short for Network Mapper, the versatile utility does everything from performing port scans and managing security configurations to troubleshooting…
What is the three lines model and what is its purpose?
<p>The three lines model is a risk management approach to help organizations identify and manage risks effectively by creating three distinct lines of defense.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1′)</script> </div> </div>…
How to prevent DoS attacks and what to do if they happen
<p>A denial-of-service attack is a cyberattack that aims to make key systems or services unavailable to users, usually by overwhelming them with traffic or malicious requests. DoS attacks bombard the target with such massive amounts of data that systems become…
Credit Karma leader shares AI governance lessons learned
<p>Not every company has the scale and skills of Intuit’s Credit Karma, but the company’s data science head has some advice on where others can begin devising their own AI governance framework.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script>…
3 eye-catching vendor announcements from Black Hat
<p>Black Hat 2025 is this week, and through all the fervor, a few things have caught my eye as worth mentioning.</p> <p>Two of them — from Check Point Software and Menlo Security — deal with secure access to apps and…
What is integrated risk management (IRM)?
<p>Integrated risk management (IRM) is a set of proactive, business-wide practices that contribute to an organization’s security, <a href=”https://www.techtarget.com/searchcio/feature/Risk-appetite-vs-risk-tolerance-How-are-they-different”>risk tolerance profile</a> and strategic decisions. As opposed to compliance-based risk management approaches, IRM focuses on evaluating risks in the wider context…
The latest from Black Hat USA 2025
<p>Black Hat USA 2025 is returning for its 28th year, covering the latest in infosec for technical experts, thought leaders, innovative vendors and cybersecurity pros.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…
What is the Mitre ATT&CK framework?
<p>The Mitre ATT&CK framework is a free, globally accessible <a href=”https://www.techtarget.com/whatis/definition/knowledge-base”>knowledge base</a> that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their <a href=”https://www.techtarget.com/searchsecurity/definition/cybersecurity”>cybersecurity</a> strategies. The acronym <i>ATT&CK</i> stands for Adversarial Tactics, Techniques and Common Knowledge.…
What is COMSEC (communications security)?
<p>Communications security (COMSEC) is the prevention of unauthorized access to <a href=”https://www.techtarget.com/searchnetworking/definition/telecommunications-telecom”>telecommunications</a> traffic or to any written information that is transmitted or transferred. There are several COMSEC disciplines, including the following:</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div>…