Tag: Search Security Resources and Information from TechTarget

How to remove digital signatures from a PDF

<p>As a result of digital transformation, organizations increasingly use digital signatures in place of handwritten signatures.</p> <p>Organizations can use authenticated — those certified by a certificate authority (<a href=”https://www.techtarget.com/searchsecurity/definition/certificate-authority”>CA</a>) — or nonauthenticated digital signatures to create legally binding agreements. However,…

What is governance, risk and compliance (GRC)?

<p>Governance, risk and compliance (GRC) refers to an organization’s strategy, or framework, for handling the interdependencies of the following three components:</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div> </div> <ol type=”1″ start=”1″…

The latest from Black Hat USA 2025

<p>Black Hat USA 2025 is returning for its 28th year, covering the latest in infosec for technical experts, thought leaders, innovative vendors and cybersecurity pros.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…

How to use Nmap to scan ports: A complete tutorial

<p>Ask any security, network or systems administrator about the top tools in their toolbox and Nmap is likely on their list. Short for Network Mapper, the versatile utility does everything from performing port scans and managing security configurations to troubleshooting…

What is the three lines model and what is its purpose?

<p>The three lines model is a risk management approach to help organizations identify and manage risks effectively by creating three distinct lines of defense.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1′)</script> </div> </div>…

How to prevent DoS attacks and what to do if they happen

<p>A denial-of-service attack is a cyberattack that aims to make key systems or services unavailable to users, usually by overwhelming them with traffic or malicious requests. DoS attacks bombard the target with such massive amounts of data that systems become…

Credit Karma leader shares AI governance lessons learned

<p>Not every company has the scale and skills of Intuit’s Credit Karma, but the company’s data science head has some advice on where others can begin devising their own AI governance framework.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script>…

What is integrated risk management (IRM)?

<p>Integrated risk management (IRM) is a set of proactive, business-wide practices that contribute to an organization’s security, <a href=”https://www.techtarget.com/searchcio/feature/Risk-appetite-vs-risk-tolerance-How-are-they-different”>risk tolerance profile</a> and strategic decisions. As opposed to compliance-based risk management approaches, IRM focuses on evaluating risks in the wider context…

The latest from Black Hat USA 2025

<p>Black Hat USA 2025 is returning for its 28th year, covering the latest in infosec for technical experts, thought leaders, innovative vendors and cybersecurity pros.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…

What is the Mitre ATT&CK framework?

<p>The Mitre ATT&amp;CK framework is a free, globally accessible <a href=”https://www.techtarget.com/whatis/definition/knowledge-base”>knowledge base</a> that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their <a href=”https://www.techtarget.com/searchsecurity/definition/cybersecurity”>cybersecurity</a> strategies. The acronym <i>ATT&amp;CK</i> stands for Adversarial Tactics, Techniques and Common Knowledge.…

What is COMSEC (communications security)?

<p>Communications security (COMSEC) is the prevention of unauthorized access to <a href=”https://www.techtarget.com/searchnetworking/definition/telecommunications-telecom”>telecommunications</a> traffic or to any written information that is transmitted or transferred. There are several COMSEC disciplines, including the following:</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div>…

Understanding Android certificate management

<p>In today’s increasingly mobile organizations, with employees accessing corporate resources from anywhere, the risk of data breaches and unauthorized access is on the rise.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div> </div>…

An explanation of quantum cryptography

<p><i>In this video, Informa TechTarget product marketing associate Katie Donegan explains what quantum cryptography is, how it differs from classical cryptography and how it works.</i></p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…

AI security: Top experts weigh in on the why and how

<p>AI is rapidly transforming business operations, bringing with it unprecedented security challenges that traditional cybersecurity approaches are not equipped to deal with. But securing the unique vulnerabilities that AI brings is essential.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script>…

8 ways to enhance data center physical security

<p>Cybersecurity is a top concern when it comes to data protection, but physical security is just as important. As cloud grows and AI enters mainstream business use, data center infrastructure will only expand, leading to unexpected physical vulnerabilities.</p> <div class=”ad-wrapper…

The latest from Black Hat USA 2025

<p>Black Hat USA 2025 is returning for its 28th year, covering the latest in infosec for technical experts, thought leaders, innovative vendors and cybersecurity pros.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div>…

How to use the John the Ripper password cracker

<section class=”section main-article-chapter” data-menu-title=”What is John the Ripper?”> <h2 class=”section-title”><i class=”icon” data-icon=”1″></i>What is John the Ripper?</h2> <p>John the Ripper is an offline password cracking tool that was <a href=”https://www.openwall.com/lists/john-users/2015/09/10/4″ target=”_blank” rel=”noopener”>developed in 1996</a> by Openwall Project. It is notable for…

News brief: Rise of AI exploits and the cost of shadow AI

<p>Organizations and employees everywhere continue to rush to use AI to boost productivity and tackle rote job functions, but new research shows this might prove disastrous. Malicious actors could use AI exploits to access sensitive data, experts say, especially if…

How to remove ransomware, step by step

<p>The ransomware attack is one of the most common types of cybersecurity attacks enterprises face. Obtaining the encryption key to unlock the files being held for ransom can be a scramble. Before panic sets in, a savvy cybersecurity team will…