-
Home
-
News
-
Ansa.it (italian)
- Homepage
- Cronaca
- Mondo
- Economia
- Sport
- Cinema
- Tecnologia
- Ultima ora
- English news
- Foto
- Video
- Abruzzo
- Basilicata
- Calabria
- Campania
- Emilia Romagna
- Friuli Venezia Giulia
- Lazio
- Lombardia
- Marche
- Molise
- Piemonte
- Puglia
- Sardegna
- Sicilia
- Toscana
- Tretino Alto Adige \ Sudtirol
- Umbria
- Valle d' Aosta
- Veneto
- Ambiente ed Energia
- Motori
- Terra & Gusto
- Salute e Benessere
- Scienza e Tecnica
- Europa
- Nuova Europa (IT)
- Nuova Europa (EN)
- Viaggiart
- CNN
- Various
-
Ansa.it (italian)
-
Software Development
-
Dzone
- AI\ML Zone
- Agile Zone
- All contents
- Big Data Zone
- Career Development Zone
- Cloud Architecture Zone
- Containers
- Data Zone
- Database Zone
- Deployment Zone
- DevOps and CI/CD
- Dzone Home
- Frameworks
- Integration
- IoT
- Java
- Javascript
- Languages
- Maintenance
- Methodologies
- Microservices
- Monitoring and Observability
- Open Source
- Performance
- Publications
- Security zone
- Team management
- Testing, Tools, and Frameworks Zone
- Tools
- Web Dev
- Frontend Development
- Java
- PHP
- Python
- Sofware Engineers
-
Dzone
-
AI
-
Cyber Security
- Threat Post
-
Websites
- Cisco Blog
- Cisco Security
- Cybersecurity 360
- Daniel Miessler
- Dark reading
- Darknet.org
- EC Council
- GBHackers On Security
- Google Online Security Blog
- Graham Cluley - Cybersecurity and AI keynote speaker
- Guardian computer security
- HackRead
- Hacker Combat
- Help Net Security
- IT Governance Blog
- IT Security Central
- ImmuniWeb - Cybercrime Investigations Weekly
- Kali Linux
- Krebs on Security
- Naked Security
- Schneier on Security
- Search Security
- Securelist.com
- Security Affairs
- Security Gladiators
- Security Week
- Seqrite Blog
- TRUSTe Blog
- The Hacker News
- Threat Insight Blog
- Trend Micro
- Zero Day | ZDNet
-
Gaming
Search Security Resources and Information from TechTarget
2026 guide to digital forensics tools for enterprises
After a data breach, organizations and law enforcement need to understand what happened. These 10 digital forensics tools collect the key evidence ...
Posted on 22 December 2025 | 3:32 pm
Prepare for the 2026 threatscape with thought leaders' insights
Explore the 2026 cybersecurity landscape, featuring AI-first strategies, human-centric defenses, cloud security and resilience-focused operations.
Posted on 22 December 2025 | 2:39 pm
News brief: Browser security flaws pose growing risk
Check out the latest security news from the Informa TechTarget team.
Posted on 19 December 2025 | 5:00 pm
How to detect a deepfake with visual clues and AI tools
Forewarned is forearmed, but too many employees don't realize how sophisticated deepfakes have become. Integrate these deepfake detection tips into...
Posted on 17 December 2025 | 6:25 pm
Android vs. iPhone: Which one is more secure?
Apple has built a reputation for strong device security, but reputation alone can't protect corporate data. While iOS and Android differ, mobile se...
Posted on 16 December 2025 | 12:45 pm
Incident response: How to implement a communication plan
Communication is critical to an effective incident response plan. Here are best practices for communication planning and an editable template to he...
Posted on 16 December 2025 | 9:00 am
5 network security predictions for 2026
What does 2026 have in store for network security? Omdia analyst John Grady shares his top five predictions for the upcoming year.
Posted on 15 December 2025 | 2:34 pm
News brief: Future of security holds bigger budgets, new threats
Check out the latest security news from the Informa TechTarget team.
Posted on 12 December 2025 | 3:41 pm
Guide to cloud container security risks and best practices
Containers are an integral part of a growing number of production environments. But they can become security risks if not managed correctly.
Posted on 12 December 2025 | 9:00 am
Beyond the SBOM: What CISOs should know about CBOMs and HBOMs
SBOMs, CBOMs and HBOMS -- oh my! Learn how these bills of materials help manage supply chain risk and assess which of the three your organization n...
Posted on 10 December 2025 | 7:43 pm
Wireless security: Differences between WEP, WPA, WPA2, WPA3
As wireless networks have evolved, so have the protocols for securing them. Get an overview of WLAN security standards, and learn the differences a...
Posted on 10 December 2025 | 1:00 pm
Top data loss prevention tools for 2026
Discover essential features of enterprise DLP tools and explore six top offerings to protect sensitive data across endpoints, networks, and cloud s...
Posted on 9 December 2025 | 12:00 am
Guide to using digital twins for cybersecurity testing
The digital twin market is growing rapidly as more security teams use the technique to run what-if scenarios to determine if their enterprise netwo...
Posted on 8 December 2025 | 1:59 pm
News brief: RCE flaws persist as top cybersecurity threat
Check out the latest security news from the Informa TechTarget team.
Posted on 5 December 2025 | 3:47 pm
Security highlights from AWS re:Invent 2025
AWS made a handful of announcements about how it is prepping to secure increased productivity with AI.
Posted on 5 December 2025 | 3:33 pm
12 key application security best practices
Developing applications involves many important practices, but one that might matter most is to be sure the team is addressing security at every st...
Posted on 4 December 2025 | 12:21 pm
What CISOs should know about SOC modernization
To achieve security outcomes that align with their organizations' risk appetites and business objectives, CISOs with struggling SOCs must consider ...
Posted on 3 December 2025 | 11:27 pm
How to use the ZMap network scanner
ZMap provides security admins with valuable information about a network's structure and functionality. But it can also generate a DoS situation if ...
Posted on 2 December 2025 | 5:31 pm
How to use Core Shell SSH, the PuTTY alternative for macOS
Core Shell is a utility every Mac user who connects to remote resources needs to know. Learn about its exceptional capabilities for managing any nu...
Posted on 1 December 2025 | 1:43 pm
How to use GPG to encrypt and decrypt files
Learn how GPG encryption protects your data through authenticity, integrity and nonrepudiation. This guide covers installation and symmetric and as...
Posted on 25 November 2025 | 1:52 pm