Category: Search Security Resources and Information from TechTarget

8 ways to enhance data center physical security

<p>Cybersecurity is a top concern when it comes to data protection, but physical security is just as important. As cloud grows and AI enters mainstream business use, data center infrastructure will only expand, leading to unexpected physical vulnerabilities.</p> <div class=”ad-wrapper…

The latest from Black Hat USA 2025

<p>Black Hat USA 2025 is returning for its 28th year, covering the latest in infosec for technical experts, thought leaders, innovative vendors and cybersecurity pros.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…

How to use the John the Ripper password cracker

<section class=”section main-article-chapter” data-menu-title=”What is John the Ripper?”> <h2 class=”section-title”><i class=”icon” data-icon=”1″></i>What is John the Ripper?</h2> <p>John the Ripper is an offline password cracking tool that was <a href=”https://www.openwall.com/lists/john-users/2015/09/10/4″ target=”_blank” rel=”noopener”>developed in 1996</a> by Openwall Project. It is notable for…

News brief: Rise of AI exploits and the cost of shadow AI

<p>Organizations and employees everywhere continue to rush to use AI to boost productivity and tackle rote job functions, but new research shows this might prove disastrous. Malicious actors could use AI exploits to access sensitive data, experts say, especially if…

How to remove ransomware, step by step

<p>The ransomware attack is one of the most common types of cybersecurity attacks enterprises face. Obtaining the encryption key to unlock the files being held for ransom can be a scramble. Before panic sets in, a savvy cybersecurity team will…

How liveness detection catches deepfakes and spoofing attacks

<p>Many security experts believe biometrics-based verification — for example, capturing users’ faces through their device cameras to confirm their identities — is critical for achieving strong cybersecurity in a user-friendly way.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div>…

How to manage Windows Server in an air-gapped environment

<p>At times, admins have unique situations that make management difficult, such as running Windows Server in an air-gapped environment.</p> <p>An air-gapped environment is an isolated network with limited or no connection to the internet or any other external network. Organizations…

The differences between inbound and outbound firewall rules

<p>It is critical to compare the roles of inbound and outbound firewall rules before deploying a corporate firewall to ensure it properly secures an enterprise IT environment.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…

Is post-quantum cryptography the next Y2K?

<p>Make no mistake — quantum computing is an existential threat to digital and data security. Quantum computing works by harnessing quantum mechanics to solve complex mathematical problems quickly — potentially breaking the public-key cryptography that protects our communications networks, financial…

What Amazon Q prompt injection reveals about AI security

<p>It was an attack scenario that has played out in code repositories, particularly open source repositories, for years — a credentials leak allowed an attacker to publish a malicious command.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div…

8 cybersecurity conferences to attend in 2025

<p>Cybersecurity is a constant problem in today’s digital age. Attending cybersecurity conferences is one way companies can learn to keep their organizations safe.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1′)</script> </div> </div> <p>In…

How mobile firewalls protect against enterprise threats

<p>Firewalls are an important tool for data protection on traditional desktops and mobile endpoints alike.</p> <p>A <a href=”https://www.techtarget.com/searchsecurity/definition/firewall”>firewall</a> is firmware or software that can manage the inbound and outbound traffic of a network or device. It provides end-user devices with…

DLP and DSPM: Navigate policy challenges and quiet alert noise

<p>At a data security seminar in July, I had the opportunity to sit down with practitioners and talk about data loss prevention challenges and how <a href=”https://www.techtarget.com/searchsecurity/definition/data-security-posture-management-DSPM”>data security posture management</a> connected to their <a href=”https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP”>DLP</a> strategies. The challenges these defenders…

11 IoT security challenges and how to overcome them

<p>From smartwatches to smart streetlights, smart home devices to smart manufacturing, the internet of things has revolutionized how people and organizations operate, improving efficiencies and optimizing processes.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…

News brief: SharePoint attacks hammer globe

<p>It was a banner week for cybercriminals and a challenging one for defenders. Hundreds of organizations saw threat actors exploit critical flaws in their Microsoft SharePoint servers, with more malicious hackers piling on and attacks still ongoing.</p> <div class=”ad-wrapper ad-embedded”>…

How to discover and manage shadow APIs

<p>Access to APIs — connectors that enable disparate systems and applications to share data and communicate — is business-critical. And because APIs have access to sensitive information, it’s important that security teams know about every API in use — yet…

How to implement security control rationalization

<p>Cybersecurity complexity is continuously compounded with the adoption of new security controls, point products and platforms — an issue that ironically creates more vulnerabilities than it solves.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…

How extortionware, cyberextortion and ransomware differ

<p>All businesses process, store and transmit customer, partner and company data. This data ranges from internal documents to price lists to HR notes on employee behavior. If released to the public, however, this information could cause tremendous embarrassment and potential…

An explanation of risk management for businesses

<p><i>In this video, Informa TechTarget industry editor Craig Stedman defines risk management and explains why it’s important for businesses.</i></p> <p>Risk management turns uncertainty into opportunity.</p> <p>Business always involves risk, whether it be financial uncertainties, technology issues, <a href=”https://www.techtarget.com/searchcio/definition/strategic-management”>strategic management</a> errors…