New & Notable
Manage
How to create a strong passphrase, with examples
Passphrases have emerged as an effective way to protect networks from brute-force attacks. But users still need to know how to create a passphrase that's effective.
Evaluate
What the $32B Google-Wiz deal says about cloud-native security
Google's acquisition of Wiz for $32 billion highlights the importance of cloud-native security as organizations transition to microservices and containerization.
Manage
Benefits and challenges of zero standing privileges
Zero standing privileges combines the zero-trust model with the principle of least privilege to strengthen privileged access management and reduce enterprise attack surfaces.
Manage
Making a case for the cybersecurity data fabric
When it comes to data, context is everything. Learn how a cybersecurity data fabric can supercharge a security team's ability to see the big picture.
Trending Topics
-
Data Security & Privacy Evaluate
10 biggest data breaches in history, and how to prevent them
Did you know the biggest data breach in history exposed a whopping 3 billion user records? Don't make the same mistakes these companies did in the largest data breaches in history.
-
Threats & Vulnerabilities News
News brief: China-linked APTs and Russian access broker
Check out the latest security news from the Informa TechTarget team.
-
IAM Manage
How to create a strong passphrase, with examples
Passphrases have emerged as an effective way to protect networks from brute-force attacks. But users still need to know how to create a passphrase that's effective.
-
Analytics & Automation News
Risk & Repeat: DeepSeek security issues emerge
The introduction of DeepSeek's new generative AI models has been met with fervor, but security issues have created apparent challenges for the Chinese startup.
-
Network Security Get Started
Types of DNS servers and how they work, plus security threats
DNS security is a critical component of system administration. Learn about five types of DNS servers, what each does and the security threats each server faces.
-
Operations & Management Manage
Making a case for the cybersecurity data fabric
When it comes to data, context is everything. Learn how a cybersecurity data fabric can supercharge a security team's ability to see the big picture.
Sponsored Sites
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
What the $32B Google-Wiz deal says about cloud-native security
Google's acquisition of Wiz for $32 billion highlights the importance of cloud-native security as organizations transition to microservices and containerization.
-
10 biggest data breaches in history, and how to prevent them
-
Top 14 open source penetration testing tools
-
Changing perceptions of network security tools from CSPs
-
-
Problem Solve
How to avoid and prevent social engineering attacks
Organizations and employees must both do their part to prevent and avoid social engineering attacks. A combination of security controls, policies, procedures and training is necessary.
-
How to improve third-party API integration security
-
How to build an API security strategy
-
Enterprise cybersecurity hygiene checklist for 2025
-
-
Manage
How to create a strong passphrase, with examples
Passphrases have emerged as an effective way to protect networks from brute-force attacks. But users still need to know how to create a passphrase that's effective.
-
Benefits and challenges of zero standing privileges
-
Making a case for the cybersecurity data fabric
-
3 types of deepfake detection technology and how they work
-
Information Security Basics
-
Get Started
WAF
A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats.
-
Get Started
buffer overflow
A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.
-
Get Started
What is elliptical curve cryptography (ECC)?
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.
Multimedia
-
News
View All -
Threats and vulnerabilities
News brief: China-linked APTs and Russian access broker
Check out the latest security news from the Informa TechTarget team.
-
Risk management
Cloudflare unveils tools for safeguarding AI deployment
The cybersecurity vendor's new suite helps businesses, developers and content creators deploy AI technology at scale safely and securely.
-
RSA 2025 Innovation Sandbox Contest Celebrates 20th Anniversary
Starting in 2025, the RSAC Innovation Sandbox Top 10 Finalists will each receive a $5 million investment to drive cybersecurity innovation.
Search Security Definitions
- What is a web application firewall (WAF)? WAF explained
- What is a buffer overflow? How do these types of attacks work?
- What is elliptical curve cryptography (ECC)?
- What is pharming?
- What is a pass-the-hash attack?
- What is a rootkit?
- What is a copyright?
- What is Kerberos and how does it work?