New & Notable

Manage

IAM compliance: Know the system controls at your disposal

IAM is critical to an organization's data security posture, and its role in regulatory compliance is just as crucial.

Manage

How to prevent a data breach: 11 best practices and tactics

When it comes to data breach prevention, the stakes are high. While it's impossible to eliminate the risk, organizations can minimize it by following these best practices.

News

News brief: China-linked APTs and Russian access broker

Check out the latest security news from the Informa TechTarget team.

Manage

How to create a strong passphrase, with examples

Passphrases have emerged as an effective way to protect networks from brute-force attacks. But users still need to know how to create a passphrase that's effective.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is a hacker?

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Get Started

    WAF

    A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats.

  • Get Started

    buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security