Search Security Resources and Information from TechTarget |
|
-
What is a time-based one-time password?
A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
-
What is security?
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.
-
News brief: Week's top breaches stem from third-party attacks
Check out the latest security news from the Informa TechTarget team.
-
What is a passkey?
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.
-
News brief: Patch critical SAP, Samsung and chat app flaws now
Check out the latest security news from the Informa TechTarget team.
-
What is penetration testing?
A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.
-
What are the top 10 spyware threats?
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.
-
How to conduct ransomware awareness training for employees
As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.
-
Model Context Protocol fever spreads in cloud-native world
The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io.
-
What is a uniform resource identifier (URI)?
A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.
-
What is a hacker?
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.
-
News brief: China-linked APTs and Russian access broker
Check out the latest security news from the Informa TechTarget team.
-
What is IT automation? A complete guide for IT teams
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.
-
5 fundamental strategies for REST API authentication
Implementing an effective REST API authentication strategy can help protect users and their data while maintaining a seamless data exchange across boundaries.
-
What is Internet Key Exchange (IKE)?
Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).
-
What is threat modeling?
Threat modeling is the systematic process of identifying threats to and vulnerabilities in software applications, and then defining countermeasures to mitigate those threats and vulnerabilities to better protect business processes, networks, systems and data.
-
How to avoid and remove malvertising
Malvertising is an up-and-coming cybersecurity threat, but marketing and IT teams alike can take several important steps to avoid and remove this threat.
-
What is the Gramm-Leach-Bliley Act (GLBA)?
The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
-
The 10 best cloud security certifications for IT pros in 2025
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.
-
What is a web server?
A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web.
|