
TechTarget

News brief: Cybersecurity weakened by government shutdown | TechTarget
The U.S. government shut down at 12:01 ET on Wednesday after Congress failed to reach a funding deal. Hundreds of thousands of employees across multiple federal programs have been affected — and the effects will ripple across the cybersecurity industry. Since the current administration took office in January, cybersecurity agencies have been under the…

What Is Regulatory Compliance? | Definition From TechTarget
Regulatory compliance is an organization’s adherence to laws, regulations, guidelines and specifications relevant to its business processes. Violations of regulatory compliance often result in legal punishment, including federal fines. Examples of regulatory compliance laws and regulations include the Payment Card Industry Data Security Standard, or PCI DSS; Health Insurance Portability and Accountability Act (HIPAA); Federal…

7 API discovery best practices for complete visibility | TechTarget
APIs often have access to sensitive data, making it critical for organizations to know about every single API in use. Yet many companies struggle with shadow APIs and undocumented endpoints. You can’t protect what you can’t see, making comprehensive API visibility fundamental to any security program. Effective API discovery requires a systematic approach that…

What is Hardware Security? | Definition from TechTarget
Hardware security is vulnerability protection that comes in the form of a physical device rather than software installed on a computer system’s hardware. Hardware security can pertain to a device used to scan a system or monitor network traffic. Common examples include hardware firewalls and proxy servers. Less common examples include hardware security modules (HSM)…

Positive vs. negative security: Choosing an AppSec model | TechTarget
An effective application security model is essential to protecting apps from threats and vulnerabilities. Two common models are positive security and negative security. While both approaches secure applications, they do so in different ways. In general, positive security models only allow approved traffic and actions and deny other requests, and negative security models block…

Is storage the weak link in your cyber-resilience strategy? | TechTarget
With the knowledge that a large-scale cyberattack is more a case of “when” than “if,” organizations require a comprehensive cyber-resiliency strategy. Since attacks such as ransomware are squarely targeting an organization’s data, this brings the data — and storage infrastructure — into sharp focus. This focus now seems to be translating into much higher…

What Android security threats should IT know about? | TechTarget
From OS vulnerabilities to ransomware attacks, Android devices continue to face a variety of security risks. As soon as Google fixes one problem, another threat comes along. Data security is of utmost importance in enterprise organizations. To protect mobile devices in these environments, IT must understand the security weaknesses of different mobile OSes. The…

What is Network Security? Definition and Best Practices | TechTarget
Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. It involves a combination of tools, policies, protocols and practices designed to prevent unauthorized access, misuse, modification or denial of a network and its resources. Successful network security strategies use multiple security approaches to protect…

How to use Masscan for high-speed port scanning | TechTarget
Port scanners are important tools that enable administrators and security personnel — and malicious actors — to identify open and listening services on a network and, therefore, determine potential entry points into computers. One popular open source is Masscan. Unlike Nmap, arguably the most popular port scanner, Masscan is a fast scanner that identifies…

Azure Local aims to answer shifting needs of the enterprise | TechTarget
Microsoft positions Azure Local as an evolution in hybrid cloud. While analysts say the vision is bold, questions remain about ease of deployment and long-term fit for the enterprise. Introduced in late 2024, Azure Local extends Azure’s policy management, monitoring and resource provisioning into customer-controlled environments, a move analysts see as an acknowledgment that…