Tag: Search Security Resources and Information from TechTarget

How liveness detection catches deepfakes and spoofing attacks

<p>Many security experts believe biometrics-based verification — for example, capturing users’ faces through their device cameras to confirm their identities — is critical for achieving strong cybersecurity in a user-friendly way.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div>…

How to manage Windows Server in an air-gapped environment

<p>At times, admins have unique situations that make management difficult, such as running Windows Server in an air-gapped environment.</p> <p>An air-gapped environment is an isolated network with limited or no connection to the internet or any other external network. Organizations…

The differences between inbound and outbound firewall rules

<p>It is critical to compare the roles of inbound and outbound firewall rules before deploying a corporate firewall to ensure it properly secures an enterprise IT environment.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…

Is post-quantum cryptography the next Y2K?

<p>Make no mistake — quantum computing is an existential threat to digital and data security. Quantum computing works by harnessing quantum mechanics to solve complex mathematical problems quickly — potentially breaking the public-key cryptography that protects our communications networks, financial…

What Amazon Q prompt injection reveals about AI security

<p>It was an attack scenario that has played out in code repositories, particularly open source repositories, for years — a credentials leak allowed an attacker to publish a malicious command.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div…

8 cybersecurity conferences to attend in 2025

<p>Cybersecurity is a constant problem in today’s digital age. Attending cybersecurity conferences is one way companies can learn to keep their organizations safe.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1′)</script> </div> </div> <p>In…

How mobile firewalls protect against enterprise threats

<p>Firewalls are an important tool for data protection on traditional desktops and mobile endpoints alike.</p> <p>A <a href=”https://www.techtarget.com/searchsecurity/definition/firewall”>firewall</a> is firmware or software that can manage the inbound and outbound traffic of a network or device. It provides end-user devices with…

DLP and DSPM: Navigate policy challenges and quiet alert noise

<p>At a data security seminar in July, I had the opportunity to sit down with practitioners and talk about data loss prevention challenges and how <a href=”https://www.techtarget.com/searchsecurity/definition/data-security-posture-management-DSPM”>data security posture management</a> connected to their <a href=”https://www.techtarget.com/whatis/definition/data-loss-prevention-DLP”>DLP</a> strategies. The challenges these defenders…

11 IoT security challenges and how to overcome them

<p>From smartwatches to smart streetlights, smart home devices to smart manufacturing, the internet of things has revolutionized how people and organizations operate, improving efficiencies and optimizing processes.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…

News brief: SharePoint attacks hammer globe

<p>It was a banner week for cybercriminals and a challenging one for defenders. Hundreds of organizations saw threat actors exploit critical flaws in their Microsoft SharePoint servers, with more malicious hackers piling on and attacks still ongoing.</p> <div class=”ad-wrapper ad-embedded”>…

How to discover and manage shadow APIs

<p>Access to APIs — connectors that enable disparate systems and applications to share data and communicate — is business-critical. And because APIs have access to sensitive information, it’s important that security teams know about every API in use — yet…

How to implement security control rationalization

<p>Cybersecurity complexity is continuously compounded with the adoption of new security controls, point products and platforms — an issue that ironically creates more vulnerabilities than it solves.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”>…

How extortionware, cyberextortion and ransomware differ

<p>All businesses process, store and transmit customer, partner and company data. This data ranges from internal documents to price lists to HR notes on employee behavior. If released to the public, however, this information could cause tremendous embarrassment and potential…

An explanation of risk management for businesses

<p><i>In this video, Informa TechTarget industry editor Craig Stedman defines risk management and explains why it’s important for businesses.</i></p> <p>Risk management turns uncertainty into opportunity.</p> <p>Business always involves risk, whether it be financial uncertainties, technology issues, <a href=”https://www.techtarget.com/searchcio/definition/strategic-management”>strategic management</a> errors…

Top DevSecOps certifications and trainings for 2025

<p>The DevSecOps market has exploded. It is expected to grow from nearly $9 billion in 2024 to $20 billion by 2030, according to Grand View Research. Yet, software training firm BILTup revealed that 37% of IT leaders can’t find qualified…

An explanation of firewall types and uses

<p><i>In this video, Informa TechTarget managing editor Kate Murray explains the different kinds of firewalls and how they are used to combat cyberthreats.</i></p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div> </div> <p>Firewalls…

Risk prediction models: How they work and their benefits

<p>One of my favorite consulting clients is an outdoor clothing retailer. It’s a highly seasonal business — summer and winter gear are different, obviously. But fashions, styles and popular color combinations change every year, too. The company’s buyers must make…

Microsoft SharePoint attacks target on-premises servers

<p>Microsoft over the weekend acknowledged active attacks targeting on-premises SharePoint servers, potentially affecting thousands of businesses and government agencies.</p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad ad-mu”> <script>GPT.display(‘mu-1’)</script> </div> </div> <p>Security research firm Eye Security…

What is a CISO (chief information security officer)?

<p>The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an <a href=”https://www.techtarget.com/searchsecurity/definition/information-security-infosec”>information security</a> program. Such programs include procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.</p>…