<p>AI agents are clocking into work. Seventy-nine percent of senior executives say their organizations are already adopting agentic AI, according to a recent <a target=”_blank” href=”https://www.pwc.com/us/en/tech-effect/ai-analytics/ai-agent-survey.html” rel=”noopener”>survey</a> by PwC, and 75% agree the technology will change the workplace more than…
Tag: Search Security Resources and Information from TechTarget
How BISOs enable CISOs to scale security across the business
<p>A business information security officer is a type of senior cybersecurity executive role that aims to provide direction and leadership at the intersection of security and business interests.</p> <p>The business information security officer (BISO) is not a replacement for a…
CNAPP vs. CSPM: Comparing cloud security tools
<p>Keeping the cloud secure is becoming increasingly complex, particularly as the number of cloud deployments continues to grow. Organizations have multiple cloud security tool options to choose from, including cloud-native application protection platforms and cloud security posture management.</p> <p>In a…
News brief: Collaboration apps face security scrutiny — again
<p>Collaboration tools are a staple in the modern workforce. The keystone to getting work done, team collaboration tools such as Slack, Teams, Zoom, Trello, Notion and Google Workspace enable employees far and wide to message each other, share documents and…
To maximize their influence, CISOs need diverse skills
<p>For a long time, the main skill that CISOs needed was the ability and readiness to resign gracefully in the wake of a major cybersecurity incident. Joking aside, early CISOs did tend to have short tenures due to the distressing…
Browser detection and response fills gaps in security programs
<p>Targeted detection and response software has become a crucial component of network security. Lately, it seems that for every technology an organization uses, a dedicated detection and response tool exists to secure it — such as network detection and response,…
News brief: Nation-state threats evolve and escalate
<p>International relations might have been polite at summit meetings this week in Asia, but in cybersecurity, the global struggles proceeded as expected. Driving much of the news were tales of nation-state threat groups causing damage worldwide through breaches, <a href=”https://www.techtarget.com/whatis/feature/Common-cryptocurrency-scams”>cryptocurrency…
How to write an information security policy, plus templates
<p>CISOs and IT security leaders need well-documented information security policies that detail how the organization manages its security program, implements technologies and addresses cybersecurity threats and vulnerabilities. These policies also underscore the IT audit process by creating controls to examine…
Cybersecurity awareness news brief: What works, what doesn’t
<p>Cybersecurity Awareness Month was introduced in October 2004 by the U.S. Department of Homeland Security and the National Cybersecurity Alliance. Its initial guidance, which covered simple security tasks — such as updating antivirus twice a year, just as you would…
Cybersecurity Awareness Month: The endpoint security issue
<p>October is Cybersecurity Awareness Month, as well as awareness month for many other — arguably more important — causes, such as breast cancer, depression, domestic violence, Down syndrome and, not to be overlooked, squirrels.</p> <p>Because endpoint security continues to become…
What is data masking?
<p>Data masking is a <a href=”https://www.techtarget.com/searchsecurity/Data-security-guide-Everything-you-need-to-know”>security</a> technique that modifies sensitive data in a data set so it can be used safely in a non-production environment. Masking allows software developers, software testers, software application trainers and data analysts to work with…
CSPM vs. DSPM: Complementary security posture tools
<p>Recent years have seen the emergence of products collectively described as security posture management tools. Primarily focused on cloud environments, these tools help organizations assess controls and configuration status, mitigate threats and vulnerabilities, and protect data.</p> <p>Two popular security posture…
How single-vendor SASE can deliver better security results
<p>For many organizations, secure access service edge has become a critical initiative to modernize their network and security approaches to better support hybrid work, cloud-centric environments and generative AI application use. Yet even six years after <a href=”https://www.techtarget.com/searchnetworking/The-complete-Secure-Access-Service-Edge-SASE-guide”>SASE</a> was introduced…
6 steps to increase Android security in the enterprise
<p>Android phones might be a good choice for many consumers, but IT teams must test their endpoints against enterprise standards. How can IT make sure these devices measure up when it comes to corporate security?</p> <p>Android security architecture has evolved…
News brief: National cyberdefenses under mounting pressure
<p>Some experts and lawmakers warn U.S. cyberdefenses are becoming more vulnerable by the day, as nation-state threats escalate. That one-two punch could have serious implications for national security and both public- and private-sector cyber-risk.</p> <p>This week’s featured articles cover a…
What is a backup storage device?
<p>A backup storage device is a hardware component that stores duplicate copies of data. This type of auxiliary storage hardware is typically used to back up data that resides in <a href=”https://www.techtarget.com/searchstorage/definition/primary-storage”>primary storage</a>. If information in primary storage becomes unavailable…
What is antivirus software?
<p>Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other types of <a href=”https://www.techtarget.com/searchsecurity/definition/malware”>malware</a> from computers, networks and other devices. Often included as part of a security package, antivirus software can also…
What is a cloud access security broker (CASB)?
<p>A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises <a href=”https://www.techtarget.com/searchdatacenter/definition/infrastructure”>infrastructure</a> and a <a href=”https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider”>cloud provider’s</a> infrastructure. A CASB tool provides a unified and consistent method of delivering cloud security for…
How to use Gophish to fortify security awareness training
<p>Security teams constantly worry about phishing scams. Of all the social engineering attacks, phishing is the most significant and effective.</p> <p>Despite thorough guidance to help employees <a href=”https://www.techtarget.com/searchsecurity/feature/How-to-avoid-phishing-hooks-A-checklist-for-your-end-users”>avoid falling victim to phishing schemes</a> and technologies that help prevent many scams…
News brief: AI’s cybersecurity risks weigh on business leaders
<p>The complicated analysis of risk around AI weighs on business leaders. They want their organizations to reap the benefits of AI. After all, chatbots enable organizations to raise their customer service game, and AI tools can streamline the hiring process,…