Security Wire Weekly

Subscribe to Security Wire Weekly feed
Updated: 57 min 47 sec ago

Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.

Fri, 03/06/2026 - 11:39pm
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.
Categories: Security Wire Weekly

Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them.

Thu, 03/05/2026 - 5:03pm
Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them.
Categories: Security Wire Weekly

Check out the latest security news from the Informa TechTarget team.

Thu, 03/05/2026 - 11:47am
Check out the latest security news from the Informa TechTarget team.
Categories: Security Wire Weekly

Loss of electric power presents a major risk to business continuity, and no organization is immune. Take these steps to create a solid business continuity plan for power outages.

Tue, 03/03/2026 - 7:43pm
Loss of electric power presents a major risk to business continuity, and no organization is immune. Take these steps to create a solid business continuity plan for power outages.
Categories: Security Wire Weekly

AI can improve the speed and effectiveness of risk management efforts. Here are the potential benefits, use cases and challenges your organization needs to know about.

Fri, 02/27/2026 - 5:05am
AI can improve the speed and effectiveness of risk management efforts. Here are the potential benefits, use cases and challenges your organization needs to know about.
Categories: Security Wire Weekly

A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.

Thu, 02/26/2026 - 6:29am
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords.
Categories: Security Wire Weekly

Several IT security frameworks and standards exist to help protect company data. Here's advice for choosing the right ones for your organization.

Wed, 02/25/2026 - 7:08pm
Several IT security frameworks and standards exist to help protect company data. Here's advice for choosing the right ones for your organization.
Categories: Security Wire Weekly

Mobile compliance now requires governance over how sensitive data is accessed across managed and personal devices. Here are practical steps for sustainable enterprise compliance.

Mon, 02/23/2026 - 8:25pm
Mobile compliance now requires governance over how sensitive data is accessed across managed and personal devices. Here are practical steps for sustainable enterprise compliance.
Categories: Security Wire Weekly

A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.

Thu, 02/19/2026 - 5:13am
A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.
Categories: Security Wire Weekly

CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.

Thu, 02/19/2026 - 4:13am
CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider.
Categories: Security Wire Weekly

When assessing cybersecurity risk, be sure to consider the scope of the project, your organization's specific assets and leadership's tolerance for risk.

Thu, 02/19/2026 - 12:11am
When assessing cybersecurity risk, be sure to consider the scope of the project, your organization's specific assets and leadership's tolerance for risk.
Categories: Security Wire Weekly

Admins will want to focus on issuing corrections for the large number of flaws, some of which require no user interaction, in Windows RRAS and Microsoft Office.

Thu, 02/19/2026 - 12:11am
Admins will want to focus on issuing corrections for the large number of flaws, some of which require no user interaction, in Windows RRAS and Microsoft Office.
Categories: Security Wire Weekly

As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.

Tue, 02/17/2026 - 3:15am
As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks.
Categories: Security Wire Weekly

The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.

Fri, 02/13/2026 - 2:21am
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.
Categories: Security Wire Weekly

A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.

Tue, 02/10/2026 - 2:56am
A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.
Categories: Security Wire Weekly

Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing.

Mon, 02/09/2026 - 8:53pm
Red teams can harness the power of LLMs for penetration testing. From session analysis to payload crafting, discover five ways AI transforms security testing.
Categories: Security Wire Weekly