New & Notable

News

SentinelOne: Ransomware actors are adapting to EDR

At RSA Conference 2024, SentinelOne's Alex Samos discussed ongoing global threats such as ransomware and how threat actors are changing their techniques.

News

Authorities identify, sanction LockBit ransomware ringleader

After weeks of waiting, authorities in the U.S., the U.K. and Australia publicly identified 'LockBitSupp,' the mysterious operator behind the prolific LockBit ransomware gang.

News

U.S. agencies continue to observe Volt Typhoon intrusions

A panel of experts at RSA Conference 2024 discussed Volt Typhoon and warned the Chinese nation-state threat group is still targeting and compromising U.S. organizations.

Manage

How to configure sudo privilege and access control settings

Learn how to use the sudo command for access control configurations, from granting full administrative privileges to delegating roles.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    VM security in cloud computing explained

    Cloud computing allows an organization to reduce its risks by having to secure fewer resources. The tradeoff is that cloud creates more attack vectors. Don't let VMs trip you up.

  • Get Started

    risk-based patch management (RBPM)

    Risk-based patch management (RBPM) is an approach to implementing patches to fix software code that prioritizes patches that address security issues posing the highest risk to the organization.

  • Get Started

    What is a cloud security engineer, and how do I become one?

    A cloud security engineer has specific responsibilities for helping to secure cloud infrastructure, applications and IT assets.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close