Category: Search Security Resources and Information from TechTarget

What is a standard operating procedure (SOP)?

<p>A standard operating procedure is a set of step-by-step instructions for performing a routine activity. SOPs should be followed the same way every time to guarantee that the organization remains consistent and complies with industry regulations and business standards.</p> <div…

News brief: U.S. Cyber Trust Mark update and how to prepare

<p>We live in a connected world. And while smart televisions, kitchen appliances, security cameras, baby monitors, robot vacuums, lawnmowers and fitness trackers make life undeniably more convenient, they also enable threat actors to virtually access users’ homes — and possibly…

Is storage the weak link in your cyber-resilience strategy?

<p>With the knowledge that a large-scale cyberattack is more a case of “when” than “if,” organizations require a comprehensive cyber-resiliency strategy. Since attacks such as ransomware are squarely targeting an organization’s data, this brings the data — and storage infrastructure…

Cyber Trust Mark certification and how IoT devices qualify

<p>Consumer IoT device manufacturers have been gearing up to participate in an FCC program — the U.S. Cyber Trust Mark — that certifies they engineered their products to meet certain cybersecurity standards. The voluntary initiative is designed to validate the…

What Android security threats should IT know about?

<p>From OS vulnerabilities to ransomware attacks, Android devices continue to face a variety of security risks. As soon as Google fixes one problem, another threat comes along.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…

What is information security (infosec)?

<p>Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information. It involves the processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction and unauthorized…

What is Triple DES and why is it disallowed?

<p>Triple Data Encryption Algorithm was used widely across many industries and in many popular network protocols to encrypt data at rest and data in motion. NIST deprecated the algorithm in 2018 and disallowed its use after 2023.</p> <div class=”ad-wrapper ad-embedded”>…

An introduction to AWS IAM and security best practices

<p>IT teams must ensure that only known and trusted users can access their organization’s vital applications and data.</p> <p>Identity and access management (IAM) continues to be top of mind for businesses, especially with the popularity of AI. Machine identities vastly…

What is network security? Definition and best practices

<p>Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. It involves a combination of tools, policies, protocols and practices designed to prevent unauthorized access, misuse, modification or denial of…

How to use Masscan for high-speed port scanning

<p>Port scanners are important tools that enable administrators and security personnel — and malicious actors — to identify open and listening services on a network and, therefore, determine potential entry points into computers.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”>…

Compare Azure Government vs. Azure’s commercial cloud

<p>For U.S. government agents and contractors, two flavors of Microsoft’s cloud platform are available: Azure Government and the general-purpose commercial cloud, Microsoft Azure. But which flavor will your organization prefer?</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div…

How AI malware works and how to defend against it

<p>Malicious actors continuously tweak their tools, techniques and tactics to bypass cyberdefenses and perform successful cyberattacks. Today, the focus is on AI, with threat actors finding ways to integrate this powerful technology into their toolkits.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage”…

How to use Netdiscover to map and troubleshoot networks

<p>Network admins, security admins and support technicians need tools that quickly map the network infrastructure to display nodes, network devices and segment boundaries. Delivering continuously updated results, Netdiscover is an excellent and flexible option to uncover live hosts on a…

What is PHI breach (protected health information breach)?

<p>A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. In the U.S., personal health information (<a href=”https://www.techtarget.com/searchhealthit/definition/personal-health-information”>PHI</a>) — whether in electronic, paper…

Red teams and AI: 5 ways to use LLMs for penetration testing

<p>Large language models, such as ChatGPT, Gemini and Claude, are redefining how people obtain information and perform their daily tasks. The cybersecurity industry is no different. Teams are using LLMs for everything from security operations center automation to defending against…

Red vs. blue vs. purple team: What are the differences?

<p>Cybersecurity team exercises involve red, blue and purple teams working in tandem to test cyberdefenses, identify vulnerabilities and weaknesses, and improve an organization’s security posture.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…

Azure Local aims to answer shifting needs of the enterprise

<p>Microsoft positions Azure Local as an evolution in hybrid cloud. While analysts say the vision is bold, questions remain about ease of deployment and long-term fit for the enterprise.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″…

Use an AI gateway to secure AI models and applications

<p>AI application development has rapidly gone from curiosity to enterprise imperative. Yet, given the type of data AI agents, large language models and applications access, it is critical to implement the proper security controls.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad…

Identity and data security themes at Black Hat 2025

<p>If you were one of the 20,000 attendees at <a href=”https://www.techtarget.com/searchsecurity/conference/Guide-to-the-latest-Black-Hat-Conference-news”>Black Hat 2025</a> in the 103-degree heat of Las Vegas, I hope you’ve recovered. For those of you who could not attend or want to get a perspective on the…