<p>From OS vulnerabilities to ransomware attacks, Android devices continue to face a variety of security risks. As soon as Google fixes one problem, another threat comes along.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…
Tag: Search Security Resources and Information from TechTarget
What is information security (infosec)?
<p>Information security (infosec) is a set of policies, procedures and principles for safeguarding digital data and other kinds of information. It involves the processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction and unauthorized…
What is Triple DES and why is it disallowed?
<p>Triple Data Encryption Algorithm was used widely across many industries and in many popular network protocols to encrypt data at rest and data in motion. NIST deprecated the algorithm in 2018 and disallowed its use after 2023.</p> <div class=”ad-wrapper ad-embedded”>…
An introduction to AWS IAM and security best practices
<p>IT teams must ensure that only known and trusted users can access their organization’s vital applications and data.</p> <p>Identity and access management (IAM) continues to be top of mind for businesses, especially with the popularity of AI. Machine identities vastly…
What is network security? Definition and best practices
<p>Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. It involves a combination of tools, policies, protocols and practices designed to prevent unauthorized access, misuse, modification or denial of…
How to use Masscan for high-speed port scanning
<p>Port scanners are important tools that enable administrators and security personnel — and malicious actors — to identify open and listening services on a network and, therefore, determine potential entry points into computers.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”>…
Compare Azure Government vs. Azure’s commercial cloud
<p>For U.S. government agents and contractors, two flavors of Microsoft’s cloud platform are available: Azure Government and the general-purpose commercial cloud, Microsoft Azure. But which flavor will your organization prefer?</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div…
How AI malware works and how to defend against it
<p>Malicious actors continuously tweak their tools, techniques and tactics to bypass cyberdefenses and perform successful cyberattacks. Today, the focus is on AI, with threat actors finding ways to integrate this powerful technology into their toolkits.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage”…
How to use Netdiscover to map and troubleshoot networks
<p>Network admins, security admins and support technicians need tools that quickly map the network infrastructure to display nodes, network devices and segment boundaries. Delivering continuously updated results, Netdiscover is an excellent and flexible option to uncover live hosts on a…
What is PHI breach (protected health information breach)?
<p>A PHI breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. In the U.S., personal health information (<a href=”https://www.techtarget.com/searchhealthit/definition/personal-health-information”>PHI</a>) — whether in electronic, paper…
Red teams and AI: 5 ways to use LLMs for penetration testing
<p>Large language models, such as ChatGPT, Gemini and Claude, are redefining how people obtain information and perform their daily tasks. The cybersecurity industry is no different. Teams are using LLMs for everything from security operations center automation to defending against…
Red vs. blue vs. purple team: What are the differences?
<p>Cybersecurity team exercises involve red, blue and purple teams working in tandem to test cyberdefenses, identify vulnerabilities and weaknesses, and improve an organization’s security posture.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…
Azure Local aims to answer shifting needs of the enterprise
<p>Microsoft positions Azure Local as an evolution in hybrid cloud. While analysts say the vision is bold, questions remain about ease of deployment and long-term fit for the enterprise.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″…
Use an AI gateway to secure AI models and applications
<p>AI application development has rapidly gone from curiosity to enterprise imperative. Yet, given the type of data AI agents, large language models and applications access, it is critical to implement the proper security controls.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad…
Identity and data security themes at Black Hat 2025
<p>If you were one of the 20,000 attendees at <a href=”https://www.techtarget.com/searchsecurity/conference/Guide-to-the-latest-Black-Hat-Conference-news”>Black Hat 2025</a> in the 103-degree heat of Las Vegas, I hope you’ve recovered. For those of you who could not attend or want to get a perspective on the…
Use ssh-keygen to generate new key pairs: A full tutorial
<p>SSH is a secure way to log into remote systems, but you can improve its security by using it to authenticate communicating hosts through the exchange of public keys — that is, generating a key pair using the <span style=”font-family:…
An explanation of quantum key distribution
<p><i>In this video, Informa TechTarget managing editor Kate Murray explains how quantum key distribution uses physics principles to create more secure cryptographic keys that classic computing can’t hack.</i></p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad…
News brief: Rising OT threats put critical infrastructure at risk
<p>One of the most notorious ransomware incidents in history happened in May 2021, when malicious hackers held the Colonial Pipeline hostage, causing gas shortages and widespread panic. The high-profile incident underscored the vulnerability of U.S. critical infrastructure and operational technology…
SSH tunneling explained: A tutorial on SSH port forwarding
<p>The <a href=”https://www.techtarget.com/searchsecurity/definition/Secure-Shell”>Secure Shell</a> protocol defines a mechanism for securely connecting to a remote host. SSH replaced <a href=”https://www.techtarget.com/searchnetworking/definition/Telnet”>Telnet</a>, the original internet application for running remote login sessions.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad…
How to write a data classification policy, with template
<p>Organizations churn out vast amounts of data every day. Those without defined data classification processes risk not knowing where their data resides or if it’s properly protected.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…