- 10 types of information security threats for IT teamson February 5, 2026 at 9:00 am
Know thine enemy — and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them.
- How to address mobile compliance in a business settingon January 26, 2026 at 10:00 am
Mobile compliance now requires governance over how sensitive data is accessed across managed and personal devices. Here are practical steps for sustainable enterprise compliance.
- Top 15 IT security frameworks and standards explainedon October 8, 2025 at 9:00 am
Several IT security frameworks and standards exist to help protect company data. Here’s advice for choosing the right ones for your organization.
- Red teams and AI: 5 ways to use LLMs for penetration testingon August 25, 2025 at 12:00 pm
Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing.
- Building a power outage business continuity plan: Step by stepon August 19, 2025 at 1:15 pm
Loss of electric power presents a major risk to business continuity, and no organization is immune. Take these steps to create a solid business continuity plan for power outages.
- News brief: SharePoint attacks hammer globeon July 25, 2025 at 2:29 pm
Check out the latest security news from the Informa TechTarget team.
- News brief: Cyberattack trends signal security arms raceon July 18, 2025 at 1:51 pm
Check out the latest security news from the Informa TechTarget team.
- AI in risk management: Top benefits and challenges explainedon July 15, 2025 at 5:23 pm
AI can improve the speed and effectiveness of risk management efforts. Here are the potential benefits, use cases and challenges your organization needs to know about.
- How to perform a cybersecurity risk assessment in 5 stepson July 9, 2025 at 12:00 am
When assessing cybersecurity risk, be sure to consider the scope of the project, your organization’s specific assets and leadership’s tolerance for risk.
- What is a CISO as a service (CISOaaS)?on July 9, 2025 at 12:00 am
CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
- Microsoft targets 130 vulnerabilities on July Patch Tuesdayon July 8, 2025 at 8:43 pm
Admins will want to focus on issuing corrections for the large number of flaws, some of which require no user interaction, in Windows RRAS and Microsoft Office.
- News brief: LOTL attacks, spoofed sites, malicious repositorieson June 20, 2025 at 2:57 pm
Check out the latest security news from the Informa TechTarget team.
- What is a time-based one-time password?on June 2, 2025 at 12:00 am
A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
- What is security?on May 30, 2025 at 4:15 pm
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization’s digital assets.
- News brief: Week’s top breaches stem from third-party attackson May 30, 2025 at 3:56 pm
Check out the latest security news from the Informa TechTarget team.
- What is a passkey?on May 21, 2025 at 12:00 pm
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.
- News brief: Patch critical SAP, Samsung and chat app flaws nowon May 16, 2025 at 5:43 pm
Check out the latest security news from the Informa TechTarget team.
- What is penetration testing?on May 14, 2025 at 9:00 am
A penetration test, also called a ‘pen test,’ is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization’s security posture.
- What are the top 10 spyware threats?on May 8, 2025 at 2:35 pm
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.
- How to conduct ransomware awareness training for employeeson April 14, 2025 at 9:00 am
As your organization’s first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.
Security Wire Weekly
We are an ethical website cyber security team and we perform security assessments to protect our clients.








