Essential Guides
TechTarget editors have curated a collection of “essential” articles on key IT topics. These articles have been packaged into guides which offer our readers comprehensive, problem solving content to help inform and guide their research.
Sponsored
-
Tackle endpoint defense issues to obtain the best endpoint security
The best endpoint security requires more than virus scanning. This guide shows why antivirus is the least of your worries when it comes to endpoint protection. Continue Reading
-
How to conduct a next-generation firewall evaluation
Before buying a next-generation firewall, read this essential guide that will walk your business through the process, from evaluation to purchase. Continue Reading
-
Black Hat 2017: Special conference coverage
The SearchSecurity team covers the threats and vulnerabilities at this year's Black Hat USA with news, features, interviews and more from Las Vegas. Continue Reading
-
How to craft an application security strategy that's airtight
A solid application security strategy today must include varieties like cloud apps and mobile. Learn how to set application security policies and practices that keep hackers out. Continue Reading
-
Black Hat 2018 conference coverage
The SearchSecurity team covers the latest threats and vulnerabilities featured at this year's Black Hat USA with news, interviews and more from Las Vegas. Continue Reading
Editorial
-
SolarWinds breach news center
The massive SolarWinds supply-chain attack continues to invade networks. Here's the latest news on the breach, how the malware infiltrates systems and the IT industry response. Continue Reading
-
Guide to the latest Black Hat 2020 Conference news
This guide to Black Hat 2020 gathers breaking news, new ideas and technical expert insights from one of the leading cybersecurity conferences in the world. Continue Reading
-
RSA Conference 2020 guide: Highlighting security's human element
What's happening at the 2020 RSA Conference? Our team keeps you up to date with pre-conference coverage and breaking news from the infosec world's biggest event. Continue Reading
-
Zero trust is IT security's best hope for effective defense
The material collected here provides not just an explanation of why you need to adopt the zero-trust model, it serves as detailed guide on moving from adoption to implementation. Continue Reading
-
Latest news from the Black Hat 2019 conference
Learn the latest from this year's Black Hat conference, Aug. 3 to 8. Our team is in Las Vegas to report on what's new in information security risks, trends and defense tactics. Continue Reading
-
How to manage application security best practices and risks
The reality of application security risks requires software developers to be mindful of testing, tools and best practices to improve user experience and information security. Continue Reading
-
How to manage email security risks and threats
When faced with email security risks -- and who isn't? -- do you have the right tools, features, training and best practices in place to face down phishing attacks and manage other threats proactively? Start with this guide. Continue Reading
-
RSAC 2019: Coverage of the premiere security gathering
Find out what's happening at the at the 2019 RSA Conference in San Francisco, the information security industry's biggest event, with breaking news and analysis by the SearchSecurity team. Continue Reading
-
A guide to SIEM platforms, benefits and features
Evaluate the top SIEM platforms before making a buying decision. Explore how the top SIEM platform tools protect enterprises by collecting security event data for centralized analysis. Continue Reading
-
Advances in access governance strategy and technology
Recent advances in IAM policy, strategy and technology are raising companies' ability authenticate identities and manage access to their systems and data. Continue Reading
-
How air gap attacks challenge the notion of secure networks
Today's cyberattacks are taking new shapes and sizes in the ever-changing tech environment. This guide explores air gap attacks, the history behind them and the latest threats facing air-gapped networks. Continue Reading
-
RSAC 2018: Special conference coverage
Find out what's happening at the information security industry's biggest event with breaking news and analysis by the SearchSecurity team at the RSA Conference 2018 in San Francisco. Continue Reading
-
GDPR compliance requirements and how to best fulfill them
Learn the details of the European Union's new regulations for data security and what your company needs to do now to meet them and avoid expensive penalties. Continue Reading
-
How the Mirai botnet changed IoT security and DDoS defense
It seemed that no IoT device was safe from the Mirai botnet when it took down major enterprises and internet infrastructure providers with massive DDoS attacks. Continue Reading
-
CISSP Domain 8: Software development security explained
If you're studying for the CISSP exam, don't miss this special Security School on Domain 8. Review important concepts in software development security and sharpen your skills. Continue Reading
-
CISSP Domain 7: Security operations
Learn about important cybersecurity techniques and technologies that serve as the foundation of both day-to-day security operations and incident response. Continue Reading
-
Containing ransomware outbreaks now a top infosec priority
Prepping for and dealing with an outbreak of ransomware is the IT version of the flu shot. Learn how company systems and data from these potentially deadline infections. Continue Reading
-
Behavioral analytics, security go hand in hand
This Security School explores behavioral analytics as a tool for enhancing the security of enterprise systems and data. Continue Reading
-
CISSP Domain 6: The importance of security assessments and testing
Security assessment and testing should be baked into your regular IT workflows so that you’re able to spot software vulnerabilities before they turn into full-blown attacks. Continue Reading
-
CISSP Domain 5: Cloud identity management and access control
From cloud identity and access management to physical access control, this study guide will help you review key concepts from Domain 5 of the CISSP exam. Continue Reading
-
Cyberthreats, cyber vulnerabilities, and how to fight back
The key to countering cyberthreats today is to first understand your biggest vulnerabilities and then research the most effective countermeasures available to minimize them. Continue Reading
-
CISSP Domain 4: Communications and network security
Brush up on network security fundamentals like segmentation and secure routing in this CISSP exam study guide for Domain 4, Communication and Network Security. Continue Reading
-
CISSP Domain 3: Security systems engineering
Planning to take the CISSP exam? Brush up on essential concepts and vocabulary in security systems engineering, covered in Domain 3, in this Security School. Continue Reading
-
CISSP Domain 2: Asset security
This Security School will help prepare you for Domain 2 of the CISSP exam, providing overviews of data encryption methods, data ownership concepts and asset protection. Continue Reading
-
CISSP Domain 1: Cybersecurity and risk management
Partner with business leaders and apply information security management principles to best address enterprise governance, risk management and compliance needs. Continue Reading
-
What data loss prevention systems and tactics can do now
Setting up systems to preventing data loss is a must for companies of all sizes. Learn the basics of and what's new in data loss prevention and how to keep your DLP system humming. Continue Reading
-
Select the best patch management software for your company
Patch management software enables businesses to prioritize and automatically update systems so that their assets remain secure. See which best fits your infosec strategy. Continue Reading
-
How threat intelligence feeds aid organizations' security posture
This Security School explores how threat intelligence feeds works and discusses the types of vendor services that exist now. Continue Reading
-
Mobile endpoint security: What enterprise infosec pros must know now
Do you know how to take care of mobile endpoint security in your enterprise? This guide walks you through all aspects of the issue, from policy and strategy to emerging threats. Continue Reading
-
Choose the right DLP tools to help execute your DLP strategy
A business's choice in DLP tools should go hand in hand with its data loss prevention strategy. See how to create an effective strategy and to select the right DLP tool for the job. Continue Reading
-
Securing big data is a growing infosec responsibility
Learn the ins and out of securing big data, from the key risks facing big data environments to the skills infosec pros need to master to handle this growing responsibility. Continue Reading
-
Set up your system for the best network security possible
The IT pro's job is to ensure the best network security network performance both. Our guide provides solid steps to take right now to achieve both in this age of mobile and the internet of things. Continue Reading
-
Privileged access management and security in the enterprise
This Security School explores the important steps enterprises need to take when managing privileged access accounts to prevent credential abuse and security incidents. Continue Reading
-
Select the vulnerability management tool that fits your business needs
See what a vulnerability management tool is, how it can help your company mitigate risk and remain compliant, and which vendors best match your company's needs. Continue Reading
-
Finding the right security analytics tools for your enterprise
See how security analytics tools can work for businesses looking for more from their security software, and what security analytics tools are right for certain business scenarios. Continue Reading
-
Wireless intrusion prevention systems: A buyer's guide
In this SearchSecurity buyer's guide, learn why it's important to have a wireless intrusion prevention system to protect your Wi-Fi networks and how to pick the right WIPS product. Continue Reading
-
Antimalware tools and techniques security pros need right now
Antimalware tools and techniques are essential to IT pros tasked with enterprise security. Consider this guide your one-stop shop for the latest info on how to counter malware. Continue Reading
-
Making updates to your IAM framework
This Security School examines how security professionals should consider updating and adapting their IAM framework to work with emerging technologies. Continue Reading
-
The best email encryption products: A comprehensive buyer's guide
Email encryption is a critical component of enterprise security. In this buyer's guide, expert Karen Scarfone breaks down what you need to know to find the best email encryption software for your organization. Continue Reading
-
How to get started securing IoT in the enterprise
This Security School examines how security professionals can commence securing IoT in the enterprise even as the number of connected devices proliferates. Continue Reading
-
RSA Conference 2016 special coverage: News and analysis
Find out what's happening in the information security industry with breaking news by the SearchSecurity team at RSA's 2016 conference in San Francisco. Continue Reading
-
The best email security gateways: A buyer's guide
In this buyer's guide, learn about the best email security gateways, how they protect enterprises from threats, and how to select and purchase the right one for your enterprise. Continue Reading
-
Network perimeter security in a perimeterless world
The old enterprise network perimeter is becoming perimeterless. Here’s how to revamp old network perimeter security strategies to cope with the new reality. Continue Reading
-
Database security products: A buyer's guide
Learn how to evaluate and buy the right database security tools for your organization with this database security tool buyer's guide. Continue Reading
-
The best SSL VPN products for you: A buyer's guide
Learn how to evaluate and buy the best SSL VPN products for your organization with this SSL VPN buyer's guide. Continue Reading
-
Security threat intelligence services: A buyer's guide
In this SearchSecurity buyer's guide, learn how security threat intelligence services benefit enterprise security and how to subscribe to the right threat intelligence service. Continue Reading
-
Knock advanced malware out cold with network anomaly detection
This Security School will get you up to speed on why network anomaly detection is crucial in the battle against advanced malware. Continue Reading
-
How to prepare for the emerging threats to your systems and data
Learn what emerging security threats your enterprise must now be prepared to face. Continue Reading
-
Endpoint security tools: A buyer's guide
Learn how to evaluate and buy the right endpoint security products for your organization with this antimalware buyer's guide. Continue Reading
-
Multifactor authentication: A buyer's guide to MFA products
In this SearchSecurity buyer's guide, learn how to evaluate and procure the right multifactor authentication product for your organization. Continue Reading
-
Full-disk encryption (FDE) tools: A buyer's guide
Learn how to evaluate and buy the right full-disk encryption product for your organization with this FDE buyer's guide. Continue Reading
-
RSA Conference 2015 special coverage: News, analysis and video
Find out what's happening in the information security industry with breaking news by the SearchSecurity team at RSA's 2015 conference in San Francisco. Continue Reading
-
Evaluating intrusion detection and prevention systems and vendors
Protecting the corporate network from intruders is a difficult task. Learn how intrusion systems help prevent, identify and minimize the effects of a breach. Continue Reading
-
Game-changing enterprise authentication technologies and standards
This Security School explores next-generation authentication technologies, standards and methods that may soon replace the personal-password system. Continue Reading
-
Understanding and responding to POS malware
Organizations must confront threats like Backoff malware to their point-of-sale systems. This guide reviews the POS malware dangers out there and offers remediation tactics. Continue Reading
-
Understanding endpoint security products, features and vendors
Securing a plethora of enterprise endpoints is challenging. This guide will help you evaluate endpoint security capabilities, products and vendors. Continue Reading
-
2014 Information Security Readers' Choice Winners
The votes are tallied. The readers have spoken. Information Security is honoring readers’ picks for the best security hardware, appliances and services in our ninth-annual Readers’ Choice Awards. Continue Reading
-
Evaluating data loss prevention tools and technology
Checking out data loss prevention tools? This guide will help you along every step, from understanding how DLP works to sealing the purchasing deal. Continue Reading
-
Evaluating mobile device management products and services
Learn why mobile device management may just be the product your organization needs to conquer its BYOD fears and trepidations. Continue Reading
-
Secure Web gateways, from evaluation to sealed deal
Get help evaluating a secure Web gateway for your enterprise as you learn what it is, its multiple features, deployment options and more. Continue Reading
-
Managing BYOD endpoint security
This newly updated Security School lesson breaks down BYOD challenges and help you develop a strategy that cuts across the myriad threats and platforms inside your organization. Continue Reading
-
How to hone an effective vulnerability management program
You must know your system's weak points to form an effective risk management program and a strong defense. Continue Reading
-
Unified threat management devices: Understanding UTM and its vendors
Get help finding the ideal unified threat management device for your enterprise as you explore how UTMs work, their pros and cons and more. Continue Reading
-
Enterprise firewall protection: Where it stands, where it's headed
Get grounded on the state of the firewall, and explore the next generation of related Internet security devices. Continue Reading
-
Security analytics: The key to reliable security data, effective action
It's tough to get reliable security data. This Security School explains how to use security analytics to safeguard your network system's health. Continue Reading
-
PCI 3.0 special report: Reviewing the state of payment card compliance
Get an in-depth analysis of PCI DSS 3.0, an illustrated history of PCI DSS and insights on the future of enterprise payment card compliance. Continue Reading
-
Endpoint security controls: Moving beyond antivirus
Mike Rothman discusses enterprise endpoint security controls for threat protection and explains how to determine which are best for your enterprise environment. Continue Reading
-
How to define SIEM strategy, management and success in the enterprise
Enterprise SIEM technology is as functional, manageable and affordable as it's ever been. Learn how to achieve success with SIEM in your organization. Continue Reading