- News brief: LOTL attacks, spoofed sites, malicious repositorieson June 20, 2025 at 2:57 pm
Check out the latest security news from the Informa TechTarget team.
- What is a time-based one-time password?on June 2, 2025 at 12:00 am
A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
- What is security?on May 30, 2025 at 4:15 pm
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization’s digital assets.
- News brief: Week’s top breaches stem from third-party attackson May 30, 2025 at 3:56 pm
Check out the latest security news from the Informa TechTarget team.
- What is a passkey?on May 21, 2025 at 12:00 pm
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.
- News brief: Patch critical SAP, Samsung and chat app flaws nowon May 16, 2025 at 5:43 pm
Check out the latest security news from the Informa TechTarget team.
- What is penetration testing?on May 14, 2025 at 9:00 am
A penetration test, also called a ‘pen test,’ is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization’s security posture.
- What are the top 10 spyware threats?on May 8, 2025 at 2:35 pm
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.
- How to conduct ransomware awareness training for employeeson April 14, 2025 at 9:00 am
As your organization’s first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.
- Model Context Protocol fever spreads in cloud-native worldon April 2, 2025 at 4:53 pm
The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io.
- What is a uniform resource identifier (URI)?on April 2, 2025 at 9:00 am
A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource — usually, but not always, connected to the internet.
- What is a hacker?on March 31, 2025 at 9:00 am
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.
- News brief: China-linked APTs and Russian access brokeron March 28, 2025 at 6:07 pm
Check out the latest security news from the Informa TechTarget team.
- What is IT automation? A complete guide for IT teamson March 27, 2025 at 9:00 am
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional’s manual work in data centers and cloud deployments.
- 5 fundamental strategies for REST API authenticationon March 17, 2025 at 5:06 pm
Implementing an effective REST API authentication strategy can help protect users and their data while maintaining a seamless data exchange across boundaries.
- What is Internet Key Exchange (IKE)?on February 4, 2025 at 9:00 am
Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).
- What is threat modeling?on January 23, 2025 at 5:07 pm
Threat modeling is the systematic process of identifying threats to and vulnerabilities in software applications, and then defining countermeasures to mitigate those threats and vulnerabilities to better protect business processes, networks, systems and data.
- How to avoid and remove malvertisingon January 13, 2025 at 2:11 pm
Malvertising is an up-and-coming cybersecurity threat, but marketing and IT teams alike can take several important steps to avoid and remove this threat.
- What is the Gramm-Leach-Bliley Act (GLBA)?on January 3, 2025 at 1:49 pm
The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
- The 10 best cloud security certifications for IT pros in 2025on December 17, 2024 at 12:00 am
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.

Security Wire Weekly
We are an ethical website cyber security team and we perform security assessments to protect our clients.