New & Notable


2018 Winter Olympics targeted by sophisticated malware

News roundup: The Olympic Destroyer malware is more sophisticated than researchers first thought. Plus, Microsoft looks to change identity management with blockchain, and more.


Intel expands bug bounties with bigger scope, rewards

Intel's bug bounty program expanded its scope and rewards for bugs across all Intel products, and the company added a new program for side-channel flaws like Meltdown and Spectre.


How new OWASP guidelines handle embedded software

OWASP released a draft of new guidelines for creating secure code within embedded software. Expert Judith Myerson discusses best practices, pitfalls to avoid and auditing tools.


Meltdown and Spectre vulnerabilities tracked by Windows Analytics

Microsoft says Meltdown and Spectre vulnerabilities are now being tracked by Windows Analytics, which shows users the update status for CPU microcode and OS patches.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started


    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the FIDO Alliance, a non-profit organization that seeks to standardize authentication at the client and protocol layers.

  • Get Started

    Top cybersecurity techniques to prevent data breaches

    Learn about important cybersecurity techniques and technologies that serve as the foundation of both day-to-day security operations and incident response.

  • Get Started

    CISSP Domain 7 practice quiz: Preventing cyberattacks

    Do you know what it takes to stop bad guys in their tracks? Find out with this practice quiz on cybersecurity methods and tools used to thwart or recover from an attack.

View All Get Started


Videos, Podcasts and Photo Stories

Blog: Security Bytes

Sections from across SearchSecurity