Security Wire Weekly

  • News brief: LOTL attacks, spoofed sites, malicious repositories
    on June 20, 2025 at 2:57 pm

    Check out the latest security news from the Informa TechTarget team.

  • What is a time-based one-time password?
    on June 2, 2025 at 12:00 am

    A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.

  • What is security?
    on May 30, 2025 at 4:15 pm

    Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization’s digital assets.

  • News brief: Week’s top breaches stem from third-party attacks
    on May 30, 2025 at 3:56 pm

    Check out the latest security news from the Informa TechTarget team.

  • What is a passkey?
    on May 21, 2025 at 12:00 pm

    A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.

  • News brief: Patch critical SAP, Samsung and chat app flaws now
    on May 16, 2025 at 5:43 pm

    Check out the latest security news from the Informa TechTarget team.

  • What is penetration testing?
    on May 14, 2025 at 9:00 am

    A penetration test, also called a ‘pen test,’ is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization’s security posture.

  • What are the top 10 spyware threats?
    on May 8, 2025 at 2:35 pm

    The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.

  • How to conduct ransomware awareness training for employees
    on April 14, 2025 at 9:00 am

    As your organization’s first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.

  • Model Context Protocol fever spreads in cloud-native world
    on April 2, 2025 at 4:53 pm

    The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io.

  • What is a uniform resource identifier (URI)?
    on April 2, 2025 at 9:00 am

    A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource — usually, but not always, connected to the internet.

  • What is a hacker?
    on March 31, 2025 at 9:00 am

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • News brief: China-linked APTs and Russian access broker
    on March 28, 2025 at 6:07 pm

    Check out the latest security news from the Informa TechTarget team.

  • What is IT automation? A complete guide for IT teams
    on March 27, 2025 at 9:00 am

    IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional’s manual work in data centers and cloud deployments.

  • 5 fundamental strategies for REST API authentication
    on March 17, 2025 at 5:06 pm

    Implementing an effective REST API authentication strategy can help protect users and their data while maintaining a seamless data exchange across boundaries.

  • What is Internet Key Exchange (IKE)?
    on February 4, 2025 at 9:00 am

    Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).

  • What is threat modeling?
    on January 23, 2025 at 5:07 pm

    Threat modeling is the systematic process of identifying threats to and vulnerabilities in software applications, and then defining countermeasures to mitigate those threats and vulnerabilities to better protect business processes, networks, systems and data.

  • How to avoid and remove malvertising
    on January 13, 2025 at 2:11 pm

    Malvertising is an up-and-coming cybersecurity threat, but marketing and IT teams alike can take several important steps to avoid and remove this threat.

  • What is the Gramm-Leach-Bliley Act (GLBA)?
    on January 3, 2025 at 1:49 pm

    The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.

  • The 10 best cloud security certifications for IT pros in 2025
    on December 17, 2024 at 12:00 am

    Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.