Media Database
>
Sharon Shea

Sharon Shea

Senior Site Editor at TechTarget

Contact this person
Email address
s*****@*******.comGet email address
Influence score
59
Phone
(XXX) XXX-XXXX Get mobile number
Location
United States
Languages
  • English
Covering topics
  • Technology

View more media outlets and journalists by signing up to Prowly

View latest data and reach out all from one place
Sign up for free

Recent Articles

techtarget.com

An explanation of purple teaming

An explanation of purple teaming
techtarget.com

11 IoT Security Challenges and How to Overcome Them

The internet of things has rapidly become commonplace in the enterprise. Learn about 11 inherent IoT security challenges and how to prepare for them.
techtarget.com

Phishing Prevention: How to Spot, Stop and Respond to Scams

Share this list of phishing techniques, detection and prevention tips, and best practices to help employees avoid falling victim to phishing schemes.
techtarget.com

12 Common Types of Malware Attacks and How to Prevent Them

Learn about 10 common types of malware attack -- from adware and bots to Trojan and viruses -- including how they work and how to prevent falling victim.
techtarget.com

The History and Evolution of Ransomware Attacks

Read up on the history and evolution of ransomware strains, from floppy disks and phishing emails to cryptocurrencies, RaaS and double extortion attacks.
techtarget.com

10 biggest data breaches in history, and how to prevent them

Read up on the 10 biggest data breaches of all time and why they happened, and get advice on how to prevent your organization from suffering a similar fate.
techtarget.com

Top 15 email security best practices for 2025

From using multifactor authentication to deploying DKIM, SPF and DMARC, promote these top email security best practices to keep your company and users safe.
techtarget.com

Top 7 enterprise cybersecurity challenges in 2025

Read about the top seven cybersecurity challenges that portend a difficult year ahead for security professionals, as well as advice on how to address them.
techtarget.com

The 10 best cloud security certifications for IT pros in 2025

Seeking a career in cloud security? Adding one or more of the best cloud security certifications to your resume could help. Read about them here.
techtarget.com

What CISOs need to know to build an OT cybersecurity program

Companies are now tapping their CISOs to oversee OT and IT security. But securing OT is different than protecting IT assets. Learn what CISOs need to do.
techtarget.com

How AI is making phishing attacks more dangerous

Cybercriminals are using AI chatbots such as ChatGPT to launch sophisticated business email compromise attacks. Cybersecurity practitioners must fight fire with fire.
techtarget.com

What is Certified information Security Manager (CISM)? Definition f...

Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.
techtarget.com

Where climate change and cyber attacks intersect

Read up on a session at RSA Conference 2023 that unveiled the connection between climate change and cyber attacks -- and how to defend against them.
techtarget.com

Reinforce industrial control system security with ICS monitoring

Industrial control system monitoring is the most important ICS security process after secure design. Read about ICS monitoring, assessment and more.
techtarget.com

ICS kill chain: Adapting the cyber kill chain to ICS environments

Learn about the Industrial Control System Kill Chain, adapted from Lockheed Martin’s Cyber Kill Chain, which considers the layered nature of ICSes.
techtarget.com

What is the Zero-Trust Security Model?

Go in-depth into the origins of zero trust, its architecture, the technology and products that comprise a zero-trust model, as well as how to implement and manage zero trust. This comprehensive guide gets you up to speed on this critical security strategy.
techtarget.com

Clearing up cybersecurity architecture confusion, challenges

Confusion surrounds cybersecurity architectures -- starting with the lack of a standard definition. One book is trying to change that. Learn how.
techtarget.com

4 criteria to measure cybersecurity goal success

Learn about four criteria to measure cybersecurity goal success against effectiveness, maturity, efficiency and alignment.
techtarget.com

The differences between web roles and worker roles in Azure - TechT...

There are two types of Azure Cloud Services roles. Learn the differences between web roles and worker roles in Azure and how to choose, deploy and manage the best role for your application.
techtarget.com

How best to address connectivity for IoT issues - TechTarget

Among the many issues companies face now is that of connectivity for IoT. Connected devices of all types offer valuable data and priceless business insights, but first the fundamental connection decision -- which goes beyond the question of wired or wireless – must be made.
techtarget.com

What's next for industrial IoT applications, standards?

Industrial IoT applications are gaining ground, as IIoT quickly transforms verticals. But despite impressive use cases, there are key obstacles thwarting IIoT progress.