New & Notable

Evaluate

Black Hat 2025: Navigating AI and supply chain security

Experts at the conference will discuss how AI impacts software supply chain security, highlighting challenges and strategies for developers and security teams.

News

News brief: Rise of AI exploits and the cost of shadow AI

Check out the latest security news from the Informa TechTarget team.

News

The latest from Black Hat USA 2025

This is your guide to the breaking news, trending topics and more from Black Hat USA 2025, one of the world's top cybersecurity conferences.

Get Started

An explanation of encryption

Encryption converts data into code that is only decipherable with the right key. This can be used to protect sensitive information in messages, payments and records.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    How to use the John the Ripper password cracker

    Password crackers are essential tools in any pen tester's toolbox. This step-by-step tutorial explains how to use John the Ripper, an open source offline password-cracking tool.

  • Get Started

    An explanation of encryption

    Encryption converts data into code that is only decipherable with the right key. This can be used to protect sensitive information in messages, payments and records.

  • Get Started

    An explanation of purple teaming

    Purple teaming unites offensive red teams and defensive blue teams to share knowledge, find vulnerabilities and strengthen security through structured frameworks and playbooks.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security