Category: Search Security Resources and Information from TechTarget

Exploited Windows zero-day addressed on April Patch Tuesday

Microsoft delivers fixes for 121 vulnerabilities with 11 rated critical this month. Admins will have extra mitigation work to correct three flaws. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: Exploited…

QR code phishing: 14 quishing prevention tips

Quishing is an offputting word for an on-the-rise attack method. Learn how to defend against it. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: QR code phishing: 14 quishing prevention tips

Google Gemini 2.5 Pro extends on-prem GenAI support

Google Gemini is the first proprietary frontier model that can be run on-premises via Google Distributed Cloud for privacy- and cost-conscious enterprises. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: Google…

Data security and identity security themes at RSAC 2025

Check out what Enterprise Strategy Group analyst Todd Thiemann has on his agenda for RSA Conference 2025. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: Data security and identity security themes…

What is sustainability risk management (SRM)?

Sustainability risk management (SRM) is a business strategy that aligns profit goals with a company’s environmental, social and governance (ESG) policies. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: What is…

AI agents raise stakes in identity and access management

IT vendors roll out fresh tools to take on identity and access management for AI agents as enterprises deploy them internally and battle malicious ones externally. This article has been indexed from Search Security Resources and Information from TechTarget Read…

RSA Conference 2025

Follow SearchSecurity’s RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world’s biggest infosec event. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article:…

Generative AI security best practices to mitigate risks

When tackling AI security issues, enterprises should minimize shadow IT risks, establish an AI governance council and train employees on the proper use of AI tools. This article has been indexed from Search Security Resources and Information from TechTarget Read…

IPsec vs. SSL VPNs: What are the differences?

New technologies get all the headlines, but VPNs aren’t going away anytime soon. Speed and security are among the factors to consider when determining what type of VPN to use. This article has been indexed from Search Security Resources and…