<p>In the age of hybrid and remote work, remote access is a powerful enabler for organizations, allowing employees, contractors, business partners, vendors and other trusted parties to access company resources. Yet, remote access increases cybersecurity risk. It inadvertently provides relatively…
Tag: Search Security Resources and Information from TechTarget
RSAC 2026 Conference: Key news and industry analysis
<p>The RSAC 2026 Conference theme is “The Power of Community.” In a tech landscape where the letters A and I are inescapable, this year’s RSAC homes in on the importance of people in cybersecurity — namely, their ability to forge…
Top vulnerability scanning tools for security teams
<p>With the right vulnerability scanning tools, organizations can identify potential weaknesses in their environments.</p> <p>The technology has changed significantly since debuting more than 30 years ago with two basic types of vulnerability scanners. One scanned the internal network for hosts,…
News brief: Stryker recovering after large-scale cyberattack
<div></div> <div> <div> <p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{39}” paraid=”1570770248″><span xml:lang=”EN-US” data-contrast=”auto”>More than a week after the blistering March 11 cyberattack on Stryker, the Michigan-based medtech company continues to restore systems to resume normal operations.</span><span data-ccp-props=”{}”> </span></p> </div> <div> <p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{79}” paraid=”51152698″><span xml:lang=”EN-US” data-contrast=”auto”>The attack, claimed by Iran-linked threat actor Handala, affected the company’s ordering, processing, shipping and manufacturing. In a post on X, Handala asserted that it wiped data from 200,000 systems, servers, laptops and…
What AI zero days mean for enterprise cybersecurity
<p>The cybersecurity arms race has entered a new phase: Attackers are racing to harness the power of AI to discover zero-day vulnerabilities at unprecedented speed and scale.</p> <p>For CISOs and other security leaders, this shift represents both an existential threat…
Secure file transfer services: Types, tools and selection tips
<p>Securely sharing and synchronizing files across systems is a cornerstone of enterprise IT. Billions of transfers occur daily, involving files of all types, sizes and structures. Because legacy file transfer mechanisms lack built-in security features, organizations use secure file transfer…
Cloud storage security best practices
<p>As organizations expand their use of public cloud storage services, enterprise IT teams are increasingly required to coordinate security, governance and data protection controls across multiple cloud platforms, regions and service tiers. Without intentional coordination, each cloud storage service may…
Top UEBA use cases in enterprise cybersecurity
<p>User and entity behavior analytics technology uncovers hidden risks to the enterprise. It does this by sifting through streams of data from various sources and looking for patterns and anomalies. That is, UEBA learns what is expected or normal and…
Top 8 benefits of hybrid cloud for business
<p>Businesses are migrating workloads to the public cloud and implementing private clouds in-house. As these forms of cloud computing continue to expand, large and small businesses are focused on a <a href=”https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud”>hybrid cloud</a> strategy to bridge the two models and form a…
Lessons in incident response from the Olympics, World Cup
<p>While the goal of every team is to keep possession, they often must hold the line, defend the goal and mount a comeback to win the game.</p> <p>This is as true in cybersecurity as it is in sports.</p> <p>Take high-profile…
Calculating the ROI of AI in cybersecurity
<p>As with many technologies, AI and cybersecurity are becoming increasingly intertwined. An organization can expect AI to support the cybersecurity mission in multiple ways, including reducing overall risk, boosting efficiency and making security more cost-effective.</p> <p>What’s not easy to determine…
Streamline SecOps with SOAR workflows and playbooks
<p>The job of the security operations center professional isn’t getting any easier. SOC teams continue to grapple with skills gaps, an overwhelming influx of security alerts and daunting resource constraints. Meanwhile, IT environments have grown increasingly complex, compounded by multi-cloud…
Multi-cloud vs. hybrid cloud: The main difference
<p>To this day, there’s no single cloud solution. Cloud technologies have expanded, matured and proliferated to support the most demanding business needs and use cases.</p> <p>The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and…
SIEM isn’t dead, its place in the SOC is just evolving
<p>Predictions about the death of <a href=”https://www.techtarget.com/searchsecurity/definition/security-information-and-event-management-SIEM”>SIEM</a> platforms have swirled for years, fueled by reports of alert fatigue, sky-high data costs and the shiny promises of extended detection and response (<a href=”https://www.techtarget.com/searchsecurity/definition/extended-detection-and-response-XDR”>XDR</a>), security data lakes and, now, <a href=”https://www.techtarget.com/searchsecurity/tip/What-agentic-AI-means-for-cybersecurity”>agentic AI</a>.…
SIEM isn’t dead, its place in the SOC is just evolving
<p>Predictions about the death of <a href=”https://www.techtarget.com/searchsecurity/definition/security-information-and-event-management-SIEM”>SIEM</a> platforms have swirled for years, fueled by reports of alert fatigue, sky-high data costs and the shiny promises of extended detection and response (<a href=”https://www.techtarget.com/searchsecurity/definition/extended-detection-and-response-XDR”>XDR</a>), security data lakes and, now, <a href=”https://www.techtarget.com/searchsecurity/tip/What-agentic-AI-means-for-cybersecurity”>agentic AI</a>.…
RSAC 2026 Conference: Key news and industry analysis
<p>The RSAC 2026 Conference theme is “The Power of Community.” In a tech landscape where the letters A and I are inescapable, this year’s RSAC homes in on the importance of people in cybersecurity — namely, their ability to forge…
News brief: Strikes on Iran put cybersecurity teams on alert
<p>The joint U.S.-Israeli strikes this week against Iran have resulted in retaliatory actions across the Gulf region that range from military to cyber.</p> <p>Pro-Iran groups have launched cyberattacks, lashing out against Israel, America and their allies in a demonstration of…
A guide to contact center security best practices
<p>Many company executives and contact center leaders know about the struggles to protect customer data. With increased distractions or assessing how new technology, like AI, can improve contact center services, company leaders can’t lose focus on emerging security threats that…
Comparison of 5 top next-generation firewall vendors
<p>Nearly 20 years after they were first developed, next-generation firewalls today play a key role in most organizations’ cybersecurity infrastructures. Among other benefits, NGFWs offer a blend of traditional firewall capabilities combined with features designed to detect and stop sophisticated…
How to remove digital signatures from a PDF
<p data-end=”567″ data-start=”322″>As organizations digitize contracts, approvals and internal documentation, digital signatures have become a standard part of enterprise document workflows. These signatures help verify document integrity and confirm the identity of the signer.</p> <p data-end=”985″ data-start=”574″>Organizations can use authenticated…