Category: Search Security Resources and Information from TechTarget

Cloud security architecture: Enterprise cloud blueprint for CISOs

<p>Cloud adoption has transformed how organizations build, deploy and scale technology. Infrastructure is now elastic, applications are distributed, identities are federated and data moves across environments at unprecedented speed. While this agility unlocks innovation, it also expands the attack surface…

Contact center compliance checklist for modern workforces

<p>Executive leaders should treat compliance as an integral part of organizational strategic planning rather than the cost of doing business.</p> <p>Organizations can face major penalties if they don’t comply with laws and regulations that protect customer data, like GDPR and…

Watch your words: Tim Brown’s advice for CISOs

<p>”Anything you say can and will be used against you.”</p> <p>As the first CISO personally indicted in a civil lawsuit, Tim Brown knows all about how what he and his colleagues said — be it industry language or benign jokes…

News brief: U.S. absence at RSAC sparks leadership concerns

<p>This week’s RSAC Conference drew 40,000-plus attendees to San Francisco, but what many noticed was who <i>wasn’t</i> there.</p> <p>The annual conference, which pulls together cybersecurity professionals from across the globe, did not feature leaders from the U.S. government. Speakers from…

Network security management challenges and best practices

<p>Increasingly sophisticated adversaries are putting IT on the defensive. A cohesive approach to network security is more critical than ever.</p> <p>Threat actors have been quick to adopt cutting-edge technologies, among them <a href=”https://www.techtarget.com/searchenterpriseai/tip/How-to-manage-generative-AI-security-risks-in-the-enterprise”>AI and automation</a>, to make their attacks more…

RSAC 2026 Conference: Key news and industry analysis

<p>The RSAC 2026 Conference theme is “The Power of Community.” In a tech landscape where the letters A and I are inescapable, this year’s RSAC homes in on the importance of people in cybersecurity — namely, their ability to forge…

10 enterprise secure remote access best practices

<p>In the age of hybrid and remote work, remote access is a powerful enabler for organizations, allowing employees, contractors, business partners, vendors and other trusted parties to access company resources. Yet, remote access increases cybersecurity risk. It inadvertently provides relatively…

RSAC 2026 Conference: Key news and industry analysis

<p>The RSAC 2026 Conference theme is “The Power of Community.” In a tech landscape where the letters A and I are inescapable, this year’s RSAC homes in on the importance of people in cybersecurity — namely, their ability to forge…

Top vulnerability scanning tools for security teams

<p>With the right vulnerability scanning tools, organizations can identify potential weaknesses in their environments.</p> <p>The technology has changed significantly since debuting more than 30 years ago with two basic types of vulnerability scanners. One scanned the internal network for hosts,…

News brief: Stryker recovering after large-scale cyberattack

<div></div> <div> <div> <p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{39}” paraid=”1570770248″><span xml:lang=”EN-US” data-contrast=”auto”>More than a week after the blistering&nbsp;March 11&nbsp;cyberattack&nbsp;on Stryker,&nbsp;the&nbsp;Michigan-based&nbsp;medtech&nbsp;company continues&nbsp;to restore systems&nbsp;to&nbsp;resume&nbsp;normal operations.</span><span data-ccp-props=”{}”>&nbsp;</span></p> </div> <div> <p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{79}” paraid=”51152698″><span xml:lang=”EN-US” data-contrast=”auto”>The attack,&nbsp;claimed by Iran-linked threat actor&nbsp;Handala,&nbsp;affected&nbsp;the company’s&nbsp;ordering, processing,&nbsp;shipping&nbsp;and&nbsp;manufacturing.&nbsp;In a post on X,&nbsp;Handala&nbsp;asserted&nbsp;that it&nbsp;wiped&nbsp;data&nbsp;from&nbsp;200,000&nbsp;systems,&nbsp;servers,&nbsp;laptops&nbsp;and…

What AI zero days mean for enterprise cybersecurity

<p>The cybersecurity arms race has entered a new phase: Attackers are racing to harness the power of AI to discover zero-day vulnerabilities at unprecedented speed and scale.</p> <p>For CISOs and other security leaders, this shift represents both an existential threat…

Secure file transfer services: Types, tools and selection tips

<p>Securely sharing and synchronizing files across systems is a cornerstone of enterprise IT. Billions of transfers occur daily, involving files of all types, sizes and structures. Because legacy file transfer mechanisms lack built-in security features, organizations use secure file transfer…

Cloud storage security best practices

<p>As organizations expand their use of public cloud storage services, enterprise IT teams are increasingly required to coordinate security, governance and data protection controls across multiple cloud platforms, regions and service tiers. Without intentional coordination, each cloud storage service may…

Top UEBA use cases in enterprise cybersecurity

<p>User and entity behavior analytics technology uncovers hidden risks to the enterprise. It does this by sifting through streams of data from various sources and looking for patterns and anomalies. That is, UEBA learns what is expected or normal and…

Top 8 benefits of hybrid cloud for business

<p>Businesses are migrating workloads to the public cloud and implementing private clouds in-house. As these forms of cloud computing continue to expand, large and small businesses are focused on a&nbsp;<a href=”https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud”>hybrid cloud</a>&nbsp;strategy to bridge the two models and form a…

Calculating the ROI of AI in cybersecurity

<p>As with many technologies, AI and cybersecurity are becoming increasingly intertwined. An organization can expect AI to support the cybersecurity mission in multiple ways, including reducing overall risk, boosting efficiency and making security more cost-effective.</p> <p>What’s not easy to determine…

Streamline SecOps with SOAR workflows and playbooks

<p>The job of the security operations center professional isn’t getting any easier. SOC teams continue to grapple with skills gaps, an overwhelming influx of security alerts and daunting resource constraints. Meanwhile, IT environments have grown increasingly complex, compounded by multi-cloud…