Category: Search Security Resources and Information from TechTarget

What is single sign-on (SSO)?

Single sign-on (SSO) is a session and user authentication service that lets users access multiple applications or systems with a single set of login credentials. This article has been indexed from Search Security Resources and Information from TechTarget Read the…

Authorization sprawl: Attacking modern access models

Attackers exploit authorization sprawl by using legitimate credentials and SSO tokens to move between systems, bypassing security controls and deploying ransomware undetected. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: Authorization…

Cybersecurity governance: A guide for businesses to follow

Cybersecurity governance is now critical, with NIST CSF 2.0 recently adding it as a dedicated function. Learn why governance is core to an effective cyber strategy. This article has been indexed from Search Security Resources and Information from TechTarget Read…

Multifactor authentication: 5 examples and strategic use cases

Before implementing MFA, conduct a careful study to determine which security factors offer the strongest protection. Passwords and PINs aren’t cutting it any longer. This article has been indexed from Search Security Resources and Information from TechTarget Read the original…

What is pure risk?

Pure risk refers to risks that are beyond human control and result in a loss or no loss, with no possibility of financial gain. This article has been indexed from Search Security Resources and Information from TechTarget Read the original…

What is risk avoidance?

Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: What is risk avoidance?

What is a SYN flood DoS attack?

A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. This exploit is also known as a ‘half-open attack.’ This article has been indexed from Search Security Resources and Information from TechTarget Read the original…

22 free cybersecurity tools you should know about

Cybersecurity products can get pricy, but there are many excellent open source tools to help secure your systems and data. Here’s a list of some of the most popular. This article has been indexed from Search Security Resources and Information…

Update Kali Linux to the latest software repository key

Kali Linux users might encounter errors when they update or download new software, exposing systems to security threats. A new repository key will eliminate those problems. This article has been indexed from Search Security Resources and Information from TechTarget Read…

What is perfect forward secrecy (PFS)?

Perfect forward secrecy (PFS), also known as forward secrecy, is an encryption style known for producing temporary private key exchanges between clients and servers. This article has been indexed from Search Security Resources and Information from TechTarget Read the original…

What is risk assessment?

Risk assessment is the process of identifying hazards that could negatively affect an organization’s ability to conduct business. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: What is risk assessment?

Mitigating AI’s unique risks with AI monitoring

Coralogix CEO highlights the difference between AI and software monitoring, as illustrated by his company’s acquisition and product expansion this year. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: Mitigating AI’s…

TikTok bans explained: Everything you need to know

The United States government takes aim at the viral video sharing application TikTok. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: TikTok bans explained: Everything you need to know

What is an advanced persistent threat (APT)?

An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. This article has been indexed from Search Security Resources and Information from TechTarget…

Kali vs. ParrotOS: Security-focused Linux distros compared

Network security doesn’t always require expensive software. Two Linux distributions — Kali Linux and ParrotOS — can help enterprises fill in their security gaps. This article has been indexed from Search Security Resources and Information from TechTarget Read the original…

What is HMAC (Hash-Based Message Authentication Code)?

Hash-based message authentication code (HMAC) is a message encryption method that uses a cryptographic key with a hash function. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: What is HMAC (Hash-Based…

3 leading multifactor authentication tool providers

Compare top MFA providers Cisco, Okta and Ping Identity. Learn product features and pricing tiers, and get advice on selecting a product for your organization’s security needs. This article has been indexed from Search Security Resources and Information from TechTarget…

What is a compliance audit? (With an example checklist)

A compliance audit is critical for finding any potential compliance gaps in an organization’s operations. Here’s what companies can do to prepare for them. This article has been indexed from Search Security Resources and Information from TechTarget Read the original…