- Top 15 IT security frameworks and standards explainedon October 8, 2025 at 9:00 am
Several IT security frameworks and standards exist to help protect company data. Here’s advice for choosing the right ones for your organization.
- Red teams and AI: 5 ways to use LLMs for penetration testingon August 25, 2025 at 12:00 pm
Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing.
- Building a power outage business continuity plan: Step by stepon August 19, 2025 at 1:15 pm
Loss of electric power presents a major risk to business continuity, and no organization is immune. Take these steps to create a solid business continuity plan for power outages.
- News brief: SharePoint attacks hammer globeon July 25, 2025 at 2:29 pm
Check out the latest security news from the Informa TechTarget team.
- News brief: Cyberattack trends signal security arms raceon July 18, 2025 at 1:51 pm
Check out the latest security news from the Informa TechTarget team.
- AI in risk management: Top benefits and challenges explainedon July 15, 2025 at 5:23 pm
AI can improve the speed and effectiveness of risk management efforts. Here are the potential benefits, use cases and challenges your organization needs to know about.
- How to perform a cybersecurity risk assessment in 5 stepson July 9, 2025 at 12:00 am
When assessing cybersecurity risk, be sure to consider the scope of the project, your organization’s specific assets and leadership’s tolerance for risk.
- What is a CISO as a service (CISOaaS)?on July 9, 2025 at 12:00 am
CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
- Microsoft targets 130 vulnerabilities on July Patch Tuesdayon July 8, 2025 at 8:43 pm
Admins will want to focus on issuing corrections for the large number of flaws, some of which require no user interaction, in Windows RRAS and Microsoft Office.
- News brief: LOTL attacks, spoofed sites, malicious repositorieson June 20, 2025 at 2:57 pm
Check out the latest security news from the Informa TechTarget team.
- What is a time-based one-time password?on June 2, 2025 at 12:00 am
A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
- What is security?on May 30, 2025 at 4:15 pm
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization’s digital assets.
- News brief: Week’s top breaches stem from third-party attackson May 30, 2025 at 3:56 pm
Check out the latest security news from the Informa TechTarget team.
- What is a passkey?on May 21, 2025 at 12:00 pm
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.
- News brief: Patch critical SAP, Samsung and chat app flaws nowon May 16, 2025 at 5:43 pm
Check out the latest security news from the Informa TechTarget team.
- What is penetration testing?on May 14, 2025 at 9:00 am
A penetration test, also called a ‘pen test,’ is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization’s security posture.
- What are the top 10 spyware threats?on May 8, 2025 at 2:35 pm
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.
- How to conduct ransomware awareness training for employeeson April 14, 2025 at 9:00 am
As your organization’s first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.
- Model Context Protocol fever spreads in cloud-native worldon April 2, 2025 at 4:53 pm
The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io.
- What is a uniform resource identifier (URI)?on April 2, 2025 at 9:00 am
A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource — usually, but not always, connected to the internet.

Security Wire Weekly
We are an ethical website cyber security team and we perform security assessments to protect our clients.