TechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa TechTarget and Informa Tech’s Digital Business Combine.——————————————————-Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities. [Black Hat News](/program/black-hat)[Omdia Cybersecurity](/program/omdia-cybersecurity)[Advertise](https://reg.darkreading.com/media-kit?kcode=drsitehd)  [Newsletter Sign-Up](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi) [](https://twitter.com/DarkReading)[](https://www.linkedin.com/company/dark-reading/)[](https://www.facebook.com/darkreadingcom/)[](https://www.youtube.com/@DarkReadingOfficialYT)[](https://www.darkreading.com/rss.xml)[](https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3&hl=en-US&gl=US)[Newsletter Sign-Up](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi) Cybersecurity Topics #### Related Topics* [Application Security](/application-security)* [Cybersecurity Careers](/cybersecurity-operations/cybersecurity-careers)* [Cloud Security](/cloud-security)* [Cyber Risk](/cyber-risk)* [Cyberattacks -& Data Breaches](/cyberattacks-data-breaches)* [Cybersecurity Analytics](/cybersecurity-analytics)* [Cybersecurity Operations](/cybersecurity-operations)* [Data Privacy](/cyber-risk/data-privacy)* [Endpoint Security](/endpoint-security)* [ICS/OT Security](/ics-ot-security)* [Identity -& Access Mgmt Security](/cybersecurity-operations/identity-access-management-security)* [Insider Threats](/vulnerabilities-threats/insider-threats)* [IoT](/ics-ot-security/iot)* [Mobile Security](/endpoint-security/mobile-security)* [Perimeter](/cybersecurity-operations/perimeter)* [Physical Security](/cybersecurity-operations/physical-security)* [Remote Workforce](/endpoint-security/remote-workforce)* [Threat Intelligence](/threat-intelligence)* [Vulnerabilities -& Threats](/vulnerabilities-threats) #### Recent in Cybersecurity Topics[Keyboard with blue key showing update](/application-security/whopping-number-microsoft-zero-days-under-attack)[Application Security](/application-security) [Whopping Number of Microsoft Zero-Days Under Attack](/application-security/whopping-number-microsoft-zero-days-under-attack)[Whopping Number of Microsoft Zero-Days Under Attack](/application-security/whopping-number-microsoft-zero-days-under-attack) by[Jai Vijayan, Contributing Writer](/author/jai-vijayan) Mar 11, 2025 5 Min Read [President Donald Trump signs the CISA Act during a ceremony in the Oval Office in 2018 in Washington, DC](/cybersecurity-operations/trump-sean-plankey-cisa-director)[Cybersecurity Operations](/cybersecurity-operations) [Trump Taps Sean Plankey to Fill Empty CISA Director Chair](/cybersecurity-operations/trump-sean-plankey-cisa-director)[Trump Taps Sean Plankey to Fill Empty CISA Director Chair](/cybersecurity-operations/trump-sean-plankey-cisa-director) by[Kristina Beek, Associate Editor, Dark Reading](/author/kristinabeek) Mar 11, 2025 1 Min Read World #### Related Topics* [DR Global](/program/dr-global)* [Middle East -& Africa](/keyword/middle-east-africa)* [Asia Pacific](/keyword/asia-pacific) #### Recent in [World](/program/dr-global)[See All](/program/dr-global) [A still from the TV show Dexter](/cyberattacks-data-breaches/hot-button-facebook-ads-middle-east-africa-victims)[Cyberattacks -& Data Breaches](/cyberattacks-data-breaches) [‘Desert Dexter’ Hot Button Facebook Ads Tag Mideast Victims](/cyberattacks-data-breaches/hot-button-facebook-ads-middle-east-africa-victims)[‘Desert Dexter’ Hot Button Facebook Ads Tag Mideast Victims](/cyberattacks-data-breaches/hot-button-facebook-ads-middle-east-africa-victims) by[Nate Nelson, Contributing Writer](/author/nate-nelson) Mar 11, 2025 3 Min Read [A map of ransomware attacks in Middle East](/cyberattacks-data-breaches/ransomware-attacks-saudi-construction-firms)[Cyberattacks -& Data Breaches](/cyberattacks-data-breaches) [Ransomware Attacks Build Against Saudi Construction Firms](/cyberattacks-data-breaches/ransomware-attacks-saudi-construction-firms)[Ransomware Attacks Build Against Saudi Construction Firms](/cyberattacks-data-breaches/ransomware-attacks-saudi-construction-firms) by[Robert Lemos, Contributing Writer](/author/robert-lemos) Mar 6, 2025 4 Min Read [The Edge](/program/the-edge) [DR Technology](/program/dr-technology) Events #### Related Topics* [Upcoming Events](/events)* [Podcasts](/podcasts)* [Webinars](/resources?types=Webinar) [SEE ALL](/events) Resources #### Related Topics* [Library](/resources)* [Newsletters](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi)* [Podcasts](/podcasts)* [Reports](/resources?types=Report)* [Videos](/videos)* [Webinars](/resources?types=Webinar)* [Whitepapers](/resources?types=Whitepaper)* [](/ )* [](/ )* [](/ )* [](/ )* [Partner Perspectives](/keyword/partner-perspectives) #### Recent in [Resources](/resources)[SEE ALL](/resources) [cybersecurity meeting concept](/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider)[Cybersecurity Operations](/cybersecurity-operations) [4 Security Questions to Ask Your Enterprise Generative AI Provider](/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider)[4 Security Questions to Ask Your Enterprise Generative AI Provider](/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider) May 30, 2024 3 Min Read [Generative AI word cloud](/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips)[Vulnerabilities -& Threats](/vulnerabilities-threats) [Looking to Leverage Generative AI? Prep for Success With These 4 Tips](/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips)[Looking to Leverage Generative AI? Prep for Success With These 4 Tips](/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips) by[Microsoft Security](/author/microsoft-security) May 28, 2024 3 Min Read 404 Error=========Going the wrong way?Sorry. The page you requested cannot be found. [Back to home page](/)  ##### Discover More[Black Hat](/program/black-hat)[Omdia](/program/omdia-cybersecurity) ##### Working With Us[About Us](/about-us)[Advertise](/advertise)[Reprints](https://info.wrightsmedia.com/informa-licensing-reprints-request) ##### Join Us[Newsletter Sign-Up](https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi) ##### Follow Us[](https://twitter.com/DarkReading)[](https://www.linkedin.com/company/dark-reading/)[](https://www.facebook.com/darkreadingcom/)[](https://www.youtube.com/@DarkReadingOfficialYT)[](https://www.darkreading.com/rss.xml)[](https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3&hl=en-US&gl=US)  Copyright © 2025. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466. [Home-|](https://www.informatech.com/)[Cookie Policy-|](/cookie-policy)[Privacy-|](https://www.techtarget.com/privacy-policy/)[Terms of Use](https://www.informatech.com/terms-and-conditions/)
Related Tags:
NAICS: 54 – Professional
Scientific
Technical Services
NAICS: 335 – Electrical Equipment
Appliance
Component Manufacturing
NAICS: 334 – Computer And Electronic Product Manufacturing
NAICS: 519 – Web Search Portals
Libraries
Archives
Other Information Services
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 92 – Public Administration
NAICS: 922 – Justice
Public Order
Safety Activities
NAICS: 33 – Manufacturing – Metal
Electronics And Other
Associated Indicators:


