SearchSecurity

New & Notable

News

Intel expands bug bounties with bigger scope, rewards

Intel's bug bounty program expanded its scope and rewards for bugs across all Intel products, and the company added a new program for side-channel flaws like Meltdown and Spectre.

Manage

How new OWASP guidelines handle embedded software

OWASP released a draft of new guidelines for creating secure code within embedded software. Expert Judith Myerson discusses best practices, pitfalls to avoid and auditing tools.

News

Meltdown and Spectre vulnerabilities tracked by Windows Analytics

Microsoft says Meltdown and Spectre vulnerabilities are now being tracked by Windows Analytics, which shows users the update status for CPU microcode and OS patches.

News

Equifax breach response criticized amid new disclosures

The Equifax breach compromised even more consumer data, including tax identification numbers, than originally reported. But the credit rating agency didn't disclose the update.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    FIDO

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the FIDO Alliance, a non-profit organization that seeks to standardize authentication at the client and protocol layers.

  • Get Started

    Top cybersecurity techniques to prevent data breaches

    Learn about important cybersecurity techniques and technologies that serve as the foundation of both day-to-day security operations and incident response.

  • Get Started

    CISSP Domain 7 practice quiz: Preventing cyberattacks

    Do you know what it takes to stop bad guys in their tracks? Find out with this practice quiz on cybersecurity methods and tools used to thwart or recover from an attack.

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Blog: Security Bytes

Sections from across SearchSecurity

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close