Techtarget security

Browse thousands of articles covering hundreds of focused tech and business topics available on TechTarget's platform. Latest News. 03 Jul 2024. ... Exploitation against CVE-2024-6387, which Qualys nicknamed 'regreSSHion,' could let attackers bypass...
Trends
Security tasks often fall to others in the organization. Here's some advice for stand-in security members. Continue Reading. WLAN security: Best practices for wireless network security. Follow these wireless network security best practices to ensure...
8 SaaS security best practices for 2024. SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more. Continue Reading.
Stay current with the latest webinars on IT Security. To continue your learning, browse more than 100,000 webinars, videos and virtual events covering hundreds of focused tech and business topics available on TechTarget's BrightTALK.com platform....
Learn the difference between these two zero-day terms, as well as why they should be high priority on any CISO's patching list. Continue Reading. Why is patch management important? Borderless networks present new challenges for security pros. Andrew...
A solid application security strategy today must include varieties like cloud apps and mobile. Learn how to set application security policies and practices that keep hackers out. Continue Reading. How to attack DDoS threats with a solid defense plan. An...
IT security is made more challenging by compliance regulations and standards, such as HIPAA, PCI DSS, Sarbanes-Oxley Act and GDPR. This is where IT security frameworks and standards are helpful. Knowledge of regulations, standards and frameworks are...
3. Errata Security. Errata Security is a blog run by Robert Graham and David Maynor, two security researchers with decades of experience. Their blog is highly opinionated, takes a long-term perspective on security, and offers insight on widely-reported...
8 SaaS security best practices for 2024. SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more. Continue Reading.
2. Dark Reading. Dark Reading is one of the most respected online magazines for security professionals, offering both news and in-depth opinion pieces on the latest developments within the industry. It has some excellent articles, offering the latest...
See more