Category: Search Security Resources and Information from TechTarget

RSAC Conference 2025

Follow SearchSecurity’s RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world’s biggest infosec event. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article:…

What is business resilience?

Business resilience is an organization’s ability to adapt quickly to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity. This article has been indexed from Search Security Resources and Information from TechTarget Read the original…

DLP in the GenAI Era: Shadow data and DLP product churn

Recent Enterprise Strategy Group research found data loss prevention product churn combined with undiscovered data and shadow IT are changing the DLP landscape. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article:…

How can an enterprise mobile VPN fit into a mobility plan?

Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: How…

RSAC Conference 2025

Follow SearchSecurity’s RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world’s biggest infosec event. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article:…

RSAC 2025 Conference: Identity security highlights

RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article:…

What are the top 10 spyware threats?

The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes. This article has been indexed from Search Security Resources and…

What is a registration authority (RA)?

A registration authority (RA) is an entity that is authorized to verify user requests for a digital certificate and also to tell a certificate authority (CA) to issue that certificate to the user. This article has been indexed from Search…

10 leading open source application security testing tools

Security testing enables companies to discover and remediate vulnerabilities and weaknesses in apps before malicious actors find them. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: 10 leading open source application…