Tag: Search Security Resources and Information from TechTarget

Incident response tabletop exercises: Guide and template

Have an incident response plan but aren’t running incident response tabletop exercises? These simulations are key to knowing if your plan will work during an actual security event. This article has been indexed from Search Security Resources and Information from…

The cloud’s role in PQC migration

Even though Q-Day might be several years away, enterprises should develop a strategic plan to prepare for the future. Experts share what challenges lie ahead with PQC migration. This article has been indexed from Search Security Resources and Information from…

How to detect and fix a jailbroken iPhone

Jailbroken devices can give rise to security threats for users and organizations alike. Learn how to prevent, detect and remove jailbreaking on enterprise iPhones. This article has been indexed from Search Security Resources and Information from TechTarget Read the original…

How to implement zero trust: 7 expert steps

Zero trust means a lot more than determining how users access resources. Successful implementation takes time, commitment and ongoing support. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: How to implement…

What is the domain name system (DNS)?

The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article:…

What is single sign-on (SSO)?

Single sign-on (SSO) is a session and user authentication service that lets users access multiple applications or systems with a single set of login credentials. This article has been indexed from Search Security Resources and Information from TechTarget Read the…

Authorization sprawl: Attacking modern access models

Attackers exploit authorization sprawl by using legitimate credentials and SSO tokens to move between systems, bypassing security controls and deploying ransomware undetected. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: Authorization…

Cybersecurity governance: A guide for businesses to follow

Cybersecurity governance is now critical, with NIST CSF 2.0 recently adding it as a dedicated function. Learn why governance is core to an effective cyber strategy. This article has been indexed from Search Security Resources and Information from TechTarget Read…