Category: Search Security Resources and Information from TechTarget

How to evaluate NGFW products to strengthen cybersecurity

<p>For years, organizations have relied on traditional firewalls as their first and best line of defense against unauthorized access to their systems. The threat landscape, however, has changed dramatically. Hybrid working models, SaaS platforms and cloud data have blurred the…

News brief: 6 Microsoft zero days and a warning from CISA

<p>Enterprises are increasingly in a race against time to address vulnerabilities before attackers exploit them.</p> <p>The bad guys are getting faster, and <a href=”https://www.techtarget.com/searchenterprisedesktop/definition/patch-management”>patch management</a> isn’t keeping up. Threat intelligence services provider Flashpoint found the average time to exploit —…

ASU’s CISO: AI craze is a strategic opportunity for security

<p>Cybersecurity leaders should capitalize on AI mania in the enterprise to address longstanding security problems, urged Arizona State University CISO Lester Godsey.</p> <p>”Executive management is all [in on] AI,” Godsey said during a recent session at CactusCon, an annual cybersecurity…

How to build an incident response framework

<p>Incident response plans enable organizations to quickly and efficiently handle cyberattacks. The lack of such a plan increases the likelihood that an attack will cause significant operational damage to IT systems, networks and data.</p> <p>When developing an effective incident response…

How CISOs can balance AI innovation and security risk

<p paraeid=”{c5710b6e-dc97-4ab0-979a-93ab83745677}{25}” paraid=”736753854″><span xml:lang=”EN-US” data-contrast=”auto”>The tradeoff between embracing innovation and protecting the organization is one of the most daunting decisions security leaders face. With AI emerging as such a powerful utility for both threat actors and cybersecurity defenders, organizations must…

8 contact center challenges and how to address them

<p>Contact centers sit at the intersection of customer experience, brand trust and operational efficiency. As customer expectations rise and AI becomes embedded in service operations, the challenges facing contact centers have grown more complex — and more consequential.</p> <p>Customer service…

Top 10 ransomware targets by industry

<p>Manufacturing remained ransomware operators’ most-targeted sector heading into 2026, according to analysis by threat researchers at cybersecurity services provider NordStellar. Other top targets by industry include IT firms, professional services providers and construction companies.</p> <p>Note, however, that — as for-profit…

Top incident response certifications to consider in 2026

<p>Incident responders detect, identify and contain cyberattacks to minimize damage on business operations. To effectively do this and be valuable members of the <a href=”https://www.techtarget.com/searchsecurity/definition/incident-response-team”>incident response team</a>, security professionals must know how to analyze logs, assemble and use an arsenal…

A leader’s guide to integrating EDR, SIEM and SOAR

<p>Modern network environments demand a cohesive and <a href=”https://www.techtarget.com/searchsecurity/The-ultimate-guide-to-cybersecurity-planning-for-businesses”>comprehensive security posture</a> as attack surfaces expand and hybrid environments become more complex.</p> <p>Endpoint detection and response, security information and event management and security orchestration, automation and response are three essential tools…

Secure MCP servers to safeguard AI and corporate data

<p>The deployment of AI for business use cases has become a major enterprise priority. But to reap AI’s potentially game-changing productivity and innovation benefits, organizations must connect large language models to their internal data and services. Enter Model Context Protocol…

Why organizations need cloud attack surface management

<div> <div> <p paraeid=”{391f7bcb-7164-4bda-b387-679b7c275a0e}{29}” paraid=”781871645″><span xml:lang=”EN-US” data-contrast=”auto”>As more organizations move to public cloud environments, they’re finding that their attack surfaces are no longer fixed perimeters but instead a constantly shifting collection of services, identities, APIs and configurations. Traditional security tools,…

Top 7 reasons incident response plans fail

<p>Like the best-laid plans of mice and men, even the best-intentioned cybersecurity <a href=”https://www.techtarget.com/searchsecurity/definition/incident-response”>incident response</a> plans can go awry. When they do, the consequences can be ugly, as many organizations have discovered in recent years.</p> <p>A 2025 survey of 1,700…

Top 19 contact center platforms of 2026

<p>Contact center software has existed since the dawn of digital contact centers decades ago. But, in recent years, the contact center software industry has changed significantly.</p> <p>New technologies, such as generative AI, have spawned powerful and innovative contact center features.…

Top open source and commercial threat intelligence feeds

<p>Cybersecurity threat intelligence feeds play an important role in security. They detail current attacks and their sources. These characteristics, better known as <a href=”https://www.techtarget.com/searchsecurity/definition/Indicators-of-Compromise-IOC”>indicators of compromise</a>, include, among other factors, IP addresses, domain names, URLs, email addresses, malware file hashes…

10 must-have security technologies in 2026

<p>The ever-evolving threat landscape looks particularly ominous to security executives scanning the 2026 horizon.</p> <p>CISOs and their teams are bracing for more sophisticated, challenging and targeted <a href=”https://www.techtarget.com/searchsecurity/feature/AI-powered-attacks-What-CISOSs-need-to-know-now”>AI-enabled cyberattacks</a>. They’re anticipating more geopolitically motivated attacks. And they’re seeing their organizations’…

Quantifying cyber risk at Netflix, Highmark Health: Case studies

<p>In 2019, CISO Omar Khawaja set out to transform the compliance-driven security culture at Highmark Health — a nonprofit healthcare company based in Pittsburgh — to one focused on business outcomes and risk.</p> <p>Khawaja turned to the <a href=”https://www.techtarget.com/searchsecurity/tip/Using-the-FAIR-model-to-quantify-cyber-risk”>Factor Analysis…

5 deepfake detection tools to protect enterprise users

<p>As tools to create deepfakes become more sophisticated, affordable and accessible, CISOs should prepare for a growing number of <a href=”https://www.techtarget.com/searchsecurity/tip/Real-world-AI-voice-cloning-attack-A-red-teaming-case-study”>social engineering attacks that hinge on fraudulent audio and video</a>. In the coming months and years, many enterprise end users…

Cybersecurity and business needs: A CISO’s 2026 outlook

<p>CISOs have a lot on their plate — and it’s only going to get fuller in the coming year.</p> <p>The role traditionally defined as a threat defender <a href=”https://www.techtarget.com/searchsecurity/tip/The-CISO-evolution-From-security-gatekeeper-to-strategic-leader”>has evolved</a> to include that of a business strategist. Where once CISOs…