About 3,750,000 results
Open links in new tab
  1. What Is Cybersecurity? | IBM

    What is cybersecurity? Cybersecurity refers to any technologies, practices and policies for preventing cyberattacks or mitigating their impact. Cybersecurity aims to protect computer …

  2. What is API security? - IBM

    May 15, 2025 · API security is a set of practices and procedures that protect application programming interfaces (APIs) and the data they transmit from misuse, malicious bot attacks …

  3. What is SOAR (security orchestration, automation and response)?

    What is SOAR (security orchestration, automation and response)? SOAR, for security orchestration, automation and response, is a software solution that enables security teams to …

  4. What Is AI Security? | IBM

    May 15, 2025 · AI security uses artificial intelligence (AI) to enhance an organization's security posture.

  5. What is IT security? - IBM

    Jun 1, 2023 · What is IT security? IT security, which is short for information technology security, is the practice of protecting an organization’s IT assets—computer systems, networks, digital …

  6. Security - ZDNET

    ZDNET news and advice keep professionals prepared to embrace innovation and ready to build a better future.

  7. What Is Information Security? | IBM

    Jul 26, 2024 · What is information security? Information security (InfoSec) is the protection of important information against unauthorized access, disclosure, use, alteration or disruption. It …

  8. What is mobile security? - IBM

    Mobile device security refers to being free from danger or risk of an asset loss or data loss by using mobile computers and communication hardware.

  9. Database Security: An Essential Guide | IBM

    Database security refers to the range of tools, controls and measures designed to establish and preserve database confidentiality, integrity and availability.

  10. Physical Security in Cybersecurity | IBM

    Apr 7, 2025 · Most of us think of cybersecurity as a purely digital affair, but cyberattacks can actually begin right here in the physical world.

Refresh