Category: Search Security Resources and Information from TechTarget

5 steps to ensure HIPAA compliance on mobile devices

<p>Complying with <a href=”https://www.techtarget.com/searchhealthit/definition/HIPAA”>HIPAA</a> on mobile devices is no longer just a technical exercise. As smartphones and tablets become part of everyday clinical workflows, organizations must be able to demonstrate who can access protected health information, under what conditions and…

5 steps to approach BYOD compliance policies

<p>Endpoint usage policies must evolve as user behavior, device ownership models and regulatory expectations continue to shift. BYOD endpoints present especially complicated challenges for organizations, which have to ensure all endpoints meet data privacy and security regulations, despite not owning…

10 cybersecurity trends to watch in 2026

<p>As cybersecurity leaders begin 2026, they face yet another year of escalations. The attack surfaces they defend are becoming bigger and more complex, while the risks and threats facing their organizations are increasing in volume, velocity and sophistication.</p> <p>It’s a…

18 enterprise email security best practices for 2026

<p>Email security best practices haven’t changed much over the years: Use strong passwords, block spam, don’t trust offers that seem too good to be true and verify requests — even from known entities.</p> <p>These longstanding practices, however, have not stopped…

Top 8 cybersecurity predictions for 2026

<p>Look into our cybersecurity crystal ball for the rest of 2026, and you probably won’t be surprised to see a familiar acronym appear: AI.</p> <p>What’s new this year is that — three years after ChatGPT first burst into public consciousness…

Use the CIA triad to shape security automation use cases

<p>Many IT automation and orchestration discussions focus on using pipelines that enable continuous integration/continuous delivery to improve IT productivity and efficiency. While these pipelines benefit service and software development, they can also bolster an organization’s security posture.</p> <p>It’s helpful to…

News brief: Security flaws put thousands of systems at risk

<p>The number of reported vulnerabilities <a target=”_blank” href=”https://www.darkreading.com/cybersecurity-analytics/vulnerabilities-surge-messy-reporting-blurs-picture” rel=”noopener”>reached an all-time high in 2025</a>, according to the National Vulnerability Database, with more than 48,000 new CVEs.</p> <p>The good news is that, according to experts, the increase likely reflects more thorough…

10 important incident response metrics and how to use them

<p>Incident response metrics help an organization assess its ability to deal with cybersecurity incidents effectively, quickly and responsibly. Where response efforts are inadequate, metrics can help cybersecurity teams and corporate leadership pinpoint what needs to change.</p> <p>If an organization only…

Vibe coding security risks and how to mitigate them

<p>Vibe coding — using generative AI to help write code — has gained traction as developers tap into AI to build software. Rather than hand-code every line of logic, developers interact with AI systems using natural language and iterative adjustment.</p>…

Cybersecurity conferences to attend in 2026

<p>CISOs and their teams must protect their organizations’ data and networks from a constant barrage of threats and an array of vulnerabilities, while also ensuring compliance with relevant cybersecurity and industry standards, regulations, legislation and frameworks.</p> <p>To stay informed about…

How to create an incident response playbook

<p>Creating and maintaining an incident response playbook can significantly improve the speed and effectiveness of your organization’s <a href=”https://www.techtarget.com/searchsecurity/definition/incident-response”>incident response</a>. Even better, it does not require a lot of extra time and effort to build a playbook.</p> <p>To help, here’s…

CISO’s guide to nonhuman identity security

<p>Nonhuman identity security has become a pressing concern as the number of machine-driven identities connecting to corporate networks continues to surge.</p> <p>According to some analysts, NHIs now exceed human accounts by factors of 10x to 50x in many organizations, especially…

Ransomware trends, statistics and facts in 2026

<p>Ransomware continues to receive attention at the highest levels of government and business — and for good reasons. It has affected people’s ability to access healthcare, put gas in their vehicles, buy groceries and protect their identities.</p> <p>The <a href=”https://www.techtarget.com/searchsecurity/tip/How-to-calculate-the-cost-of-a-data-breach”>financial…

Real-world AI voice cloning attack: A red teaming case study

<p>As an ethical hacker, I put organizations’ cyberdefenses to the test, and — like malicious threat actors — I know that social engineering remains one of the most effective methods for gaining unauthorized access to private IT environments.</p> <p>The Scattered…

Top web app security vulnerabilities and how to mitigate them

<p>The list of top web application security vulnerabilities and risks has remained largely unchanged for the past decade, and the attack vectors are well-known to security practitioners and developers alike. Yet these problems persist, despite their solutions being readily available…