TechTarget

Software supply chain security AI agents take action | TechTarget
Software supply chain security tools from multiple vendors moved from software vulnerability detection to proactive vulnerability fixes with new AI agents released this week. AI agents are autonomous software entities backed by large language models that can act on natural language prompts or event triggers within an environment, such as software pull requests. As…

How Do Hackers Steal Credit Card Information? | TechTarget
Cybersecurity has never been more critical given the exponential growth of e-commerce and online transactions. Hackers may attempt to invade our privacy in several ways, but one area they find particularly enticing is credit card information. Stolen credit cards can negatively affect not just your finances but your personal identity and privacy, too. Protecting them…

Ransomware Trends, Statistics and Facts in 2025 | Informa TechTarget
While ransomware isn’t a new cybersecurity risk, it continues to receive attention at the highest levels of government worldwide. Ransomware has affected people’s ability to get healthcare, put gas in their vehicles and buy groceries. The financial effects of ransomware have also become particularly pronounced in recent years. Attacks on supply chains have caused more…

How to Prevent and Protect Against Ransomware | Informa TechTarget
The ransomware threat continues to plague organizations of all types and sizes. The SANS Institute reported a 73% increase in ransomware activity between 2022 and 2023, and Corvus Insurance identified 55 new ransomware groups in 2024. Preparation for a potential ransomware attack should be a priority. Take stock of existing cybersecurity controls and processes…

Security could be the use case AI PCs need | TechTarget
In an era where interest in AI PCs is soaring and injecting life into what was a stagnant endpoint device market, the enthusiasm has been met with a lack of clearly defined use cases. The early use cases touted by hardware and software vendors often revolved around unified communications and collaboration. While that’s a…

Making a case for the cybersecurity data fabric | TechTarget
Information, data and context are the weapons that cybersecurity teams use to battle adversaries daily. Yet, using cybersecurity data in the modern enterprise has become increasingly difficult. The data is often scattered among dozens of point technologies, fragmented with use-case-specific interfaces, and siloed between IT, security and application teams with little capability to support…

How to secure AI infrastructure: Best practices | TechTarget
AI and generative AI represent great opportunities for enterprise innovation, but as these tools become more prevalent, their attack surfaces attract malicious hackers probing potential weaknesses. The same capabilities that enable AI to transform industries also make it a lucrative target for malicious actors. Let’s examine why constructing a secure AI infrastructure is so important…

Incident response for web application attacks | TechTarget
As long as web application attacks are successful, malicious actors will continue to target them. Even with strong security programs, organizations will fall victim to such attacks. To come out the other side as unscathed as possible, it is important for organizations to have a web application incident response plan in place. Incident response…

What is a certificate authority (CA)? | Definition from TechTarget
A certificate authority (CA) is a trusted entity that issues digital certificates to authenticate content sent from web servers. These certificates are data files used to cryptographically link an entity with a public key. Web browsers use them to authenticate content sent from web servers, ensuring trust in content delivered online and facilitating more trustworthy…

What is the NSA and how does it work? | Definition from TechTarget
The National Security Agency (NSA) is a federal government surveillance and intelligence agency that’s part of the U.S. Department of Defense and is managed under the authority of the director of national intelligence (DNI). Led by the NSA director, the agency performs global electronic monitoring, collection and processing of information and data from its headquarters…