<p>Heartbleed, SolarWinds and Log4j — the stuff of CISOs’ nightmares. As cybersecurity leaders know all too well, these historic, high-profile security breaches revealed massive weaknesses in supply chain security.</p> <p>Rising <a href=”https://www.techtarget.com/searchsecurity/tip/How-to-create-a-third-party-risk-management-policy”>awareness of third-party risk</a> has led to a surge…
Tag: Search Security Resources and Information from TechTarget
Wireless security: Differences between WEP, WPA, WPA2, WPA3
<p>In wireless security, passwords are only half the battle. Choosing the proper level of encryption is just as vital, and the right choice determines whether your wireless LAN is a house of straw or a resilient fortress.</p> <p>Wireless security protocols have evolved…
Top data loss prevention tools for 2026
<p>Of all the security techniques aimed at ensuring data security and combating data breaches, data loss prevention tools are far and away the most common. DLP tools continuously monitor and analyze data to identify security policy violations and, if appropriate,…
Guide to using digital twins for cybersecurity testing
<p>Digital twins are virtual duplicates of existing systems, infrastructure and processes designed to help security staff perform advanced monitoring and threat modeling in a simulated environment. Cybersecurity testing with digital twins enables organizations to mirror real-world deployments, using what-if scenarios…
Security highlights from AWS re:Invent 2025
<p>Las Vegas this week welcomed more than 60,000 attendees for <a href=”https://www.techtarget.com/searchcloudcomputing/conference/A-conference-guide-to-AWS-reInvent”>AWS re:Invent</a>, and the message was clear: AWS wants to be the platform of choice for the agentic era. In fact, CEO Matt Garman opened the keynote describing AWS…
News brief: RCE flaws persist as top cybersecurity threat
<p>Remote code execution flaws are among the most prevalent and critical vulnerabilities in software today. Some of the most high-profile cybersecurity events in history — including the 2021 Log4Shell Log4j library vulnerability, the Apache Struts vulnerability that led to the…
12 key application security best practices
<p>Organizations use third-party software and develop their own applications to make their business function. Such applications are often essential to operations, which means the security of those apps is also of great importance.</p> <p>The principal goal of application security is…
What CISOs should know about SOC modernization
<p>Legacy SOC infrastructure can’t keep pace with the modern threat landscape, leaving SecOps teams overwhelmed and underprepared to face increasingly sophisticated and frequent cyber threats. Security alerts and malicious actors eventually slip through the cracks, putting organizations at risk of…
How to use the ZMap network scanner
<p>ZMap, an open source utility under the Apache 2.0 license, is a unique and powerful high-speed network scanner designed to probe the internet. The app focuses on performance rather than depth. As a result, it conducts simple scans that are…
How to use Core Shell SSH, the PuTTY alternative for macOS
<p>Security and network administration depend on SSH. Administrators, developers and power users rely on the protocol to secure connections to remote servers, IoT devices, network devices and cloud resources. Windows users can use the <a href=”https://www.techtarget.com/searchsecurity/tutorial/How-to-use-PuTTY-for-SSH-key-based-authentication”>PuTTY utility</a> to connect to…
How to use GPG to encrypt and decrypt files
<p>GnuPG, commonly known as GPG, is an open source implementation of the <a href=”https://www.techtarget.com/searchsecurity/definition/Pretty-Good-Privacy”>Pretty Good Privacy</a> cryptography standard. It offers symmetric and asymmetric encryption for data at rest and in transit.</p> <p>This article introduces how to use GPG, demonstrates its…
5 steps for a smooth SIEM implementation
<p>Security information and event management technology has long been a cornerstone of the SOC — collecting, correlating and centralizing security data to enable more efficient and effective threat detection and incident response.</p> <p><a href=”https://www.techtarget.com/searchsecurity/definition/security-information-and-event-management-SIEM”>SIEM</a> integrates with tools, services and endpoints…
What is identity and access management? Guide to IAM
<p>Identity and access management, or IAM, is a framework of business processes, policies and technologies that facilitates the management of digital identities. With an IAM framework in place, IT security teams can control user access to critical information within their…
News brief: U.S. cyberdefenses take aim at foreign threats
<p>U.S. cyberdefenders said they are stepping up efforts to counter foreign attacks that target American citizens and companies. In recent days, the Trump administration has taken several actions against groups it blames for cyber schemes and has outlined a strategy…
How to use Netcat: Commands and use cases
<p>Netcat is arguably the most flexible network security tool available to security administrators today, and one that is valuable for any security practitioner to have in-depth knowledge of.</p> <p>Let’s take a look at how to use Netcat and explore some…
F5-CrowdStrike network security partnership: Is EDR enough?
<p>Seeking to better protect customers from exploitable network devices, F5 and CrowdStrike recently <a target=”_blank” href=”https://www.f5.com/company/news/press-releases/f5-and-crowdstrike-strengthen-web-traffic-security-with-falcon-for-f5-big-ip” rel=”noopener”>announced</a> a technology alliance in which CrowdStrike Falcon will integrate with and run directly on F5’s BIG-IP platform. This partnership will enable customers to…
How to plan an IAM program strategy
<p>A formal identity and access management strategy is crucial for every organization, as it enables security and risk management leaders to deliver their digital strategy. A recent survey revealed that simply having a well-developed written IAM strategy can increase an…
How to use Hashcat to recover passwords
<p>Ethical hacking often involves password theft. Red teams, for example, test passwords for policy weaknesses, common password use and password reuse across accounts. Blue teams test passwords for audits, compliance and digital forensics.</p> <p>In many cases, passwords retrieved by ethical…
What agentic AI means for cybersecurity
<p>Security practitioners are engaged in a battle against an enemy that sometimes seems to have all the ammunition.</p> <p>Case in point: Organizations worldwide field hundreds of millions of cyberattacks daily, according to the <a target=”_blank” href=”https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2024″ rel=”noopener”>Microsoft Digital Defense Report…
News brief: Agentic AI disrupts security, for better or worse
<p>AI agents are clocking into work. Seventy-nine percent of senior executives say their organizations are already adopting agentic AI, according to a recent <a target=”_blank” href=”https://www.pwc.com/us/en/tech-effect/ai-analytics/ai-agent-survey.html” rel=”noopener”>survey</a> by PwC, and 75% agree the technology will change the workplace more than…