
TechTarget

How to write a data classification policy, with template | TechTarget
Organizations churn out vast amounts of data every day. Those without defined data classification processes risk not knowing where their data resides or if it’s properly protected. Let’s examine how to create a data classification policy that ensures data is described, located, secured and complies with domestic and global data protection standards and regulations….

What is Integrated Risk Management (IRM)? | Definition from TechTarget
What is integrated risk management? Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization’s security, risk tolerance profile and strategic decisions. As opposed to compliance-based risk management approaches, IRM focuses on evaluating risks in the wider context of business strategy. An IRM program should be collaborative and involve…

How to use the John the Ripper password cracker | TechTarget
What is John the Ripper? John the Ripper is an offline password cracking tool that was developed in 1996 by Openwall Project. It is notable for supporting a diversity of password formats. This tool enables security practitioners to crack passwords, regardless of encrypted or hashed passwords, message authentication codes (MACs) and hash-based MACs (HMACs),…

How to implement security control rationalization | TechTarget
Cybersecurity complexity is continuously compounded with the adoption of new security controls, point products and platforms — an issue that ironically creates more vulnerabilities than it solves. In research from Enterprise Strategy Group, now part of Omdia, 37% of respondents said their organization uses more than 26 security products, with 10% of those saying they…

Risk Prediction Models: How They Work and Their Benefits | TechTarget
One of my favorite consulting clients is an outdoor clothing retailer. It’s a highly seasonal business — summer and winter gear are different, obviously. But fashions, styles and popular color combinations change every year, too. The company’s buyers must make decisions about inventory well in advance to order for upcoming seasons. They obsess about…

How to Calculate Cybersecurity ROI for CEOs and Boards | TechTarget
Everyone knows we need cybersecurity. But whether they admit it or not, businesses don’t always want to pay for it. Too often, the C-suite sees security as a cost center, making it difficult for CISOs to secure funding for new tools and initiatives. While cybersecurity doesn’t directly drive revenue, it does maximize business continuity,…

How to Build a Cybersecurity Culture Across Your Business | TechTarget
Every organized group of people has a culture — a combination of norms that guide them, structured roles they fill and common practices and tools they use to play their roles and achieve their goals. Well-managed companies have an overall corporate culture and specific ones in key business areas, including cybersecurity. A cybersecurity culture…

What is the Domain Name System (DNS)? | Definition from TechTarget
The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses. The DNS maps the name people use to locate a website to the IP address that a computer uses to locate that website. For example, if someone types example.com into a web…

12 Top DevSecOps Tools to Secure Each Step of the SDLC | TechTarget
DevSecOps has transformed software development, taking security from a bolted-on afterthought to an integral part of the process. Security decisions and implementation now happen in real time alongside development. DevSecOps success hinges on choosing the right security tools and embedding them at every stage of the software development lifecycle (SDLC) — from initial code…

22 Free Cybersecurity Tools You Should Know About | TechTarget
Cybersecurity tools aren’t just for the enterprise anymore; they’re essential for every type and size of organization. Some tools specialize in antivirus, while others focus on spear phishing, network security or scripting. Even the best cybersecurity products can only do a few things very well, and there is no room for error. Effective products,…