New & Notable
Evaluate
Data sovereignty compliance challenges and best practices
Organizations that use the cloud face stiff challenges in complying with data sovereignty laws and regulations. The first step: Understand which laws apply.
News
AMD processor vulnerability inadvertently leaked early
The flaw was revealed when hardware manufacturer Asus published a patch for an 'AMD Microcode Signature Verification Vulnerability' to a gaming motherboard update page.
News
Zero-day vulnerability in SonicWall SMA series under attack
SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
Evaluate
Too many 'point'less tools: Platformization is better
Will 2025 be the year organizations ditch multiple point products and take a platform approach? Enterprise Strategy Group analyst Tyler Shields thinks it should be.
Trending Topics
-
Data Security & Privacy News
Threat actor publishes data of 15K hacked FortiGate firewalls
Although the threat actor published the alleged stolen Fortinet FortiGate firewall data this week, the data is apparently tied to older zero-day exploitation from 2022.
-
Threats & Vulnerabilities News
Zero-day vulnerability in SonicWall SMA series under attack
SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
-
IAM Manage
Adopt passkeys over passwords to improve UX, drive revenue
Password use leads to higher UX friction and lost sales because customers want a smoother sign-in experience. Passkeys can simplify authentication and improve UX.
-
Analytics & Automation News
Microsoft enhanced Recall security, but will it be enough?
Microsoft's controversial Recall feature began rolling out to certain Windows Insiders with Copilot+ PCs in November, with more expected to participate this month.
-
Network Security News
Eclypsium finds security issues in Palo Alto Networks NGFWs
Eclypsium researchers stressed how essential supply chain security is as threat actors increasingly target and exploit vulnerabilities in firewalls, VPNs and other edge devices.
-
Operations & Management Evaluate
Too many 'point'less tools: Platformization is better
Will 2025 be the year organizations ditch multiple point products and take a platform approach? Enterprise Strategy Group analyst Tyler Shields thinks it should be.
Sponsored Sites
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Servers
Server Buying Considerations 2023
This site focusses on key server buying considerations for IT decision makers in 2023 and beyond, with an emphasis on innovations in server design, security, sustainability, automation, and financing flexibility from Dell Technologies and Intel®.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Too many 'point'less tools: Platformization is better
Will 2025 be the year organizations ditch multiple point products and take a platform approach? Enterprise Strategy Group analyst Tyler Shields thinks it should be.
-
Top 10 security certifications
-
9 secure email gateway options for 2025
-
Top 7 data loss prevention tools for 2025
-
-
Problem Solve
Enterprise cybersecurity hygiene checklist for 2025
Enterprise cybersecurity hygiene must be a shared responsibility between employees and employers. Learn how both can get the job done with this checklist.
-
How to protect against malware as a service
-
How to recover from a DDoS attack
-
Biometric privacy and security challenges to know
-
-
Manage
Adopt passkeys over passwords to improve UX, drive revenue
Password use leads to higher UX friction and lost sales because customers want a smoother sign-in experience. Passkeys can simplify authentication and improve UX.
-
Top 12 online cybersecurity courses for 2025
-
Top 15 email security best practices for 2025
-
Add gamification learning to your pen testing training playbook
-
Information Security Basics
-
Get Started
What is threat modeling?
Threat modeling is the systematic process of identifying threats to and vulnerabilities in software applications, and then defining countermeasures to mitigate those threats and vulnerabilities to better protect business processes, networks, systems...
-
Get Started
What is SSL (Secure Sockets Layer)?
SSL (Secure Sockets Layer) is a networking protocol that secures connections between web clients and web servers over internal networks or the internet by encrypting the data sent between those clients and servers.
-
Get Started
What is hacktivism?
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason.
Multimedia
-
News
View All -
Threats and vulnerabilities
Zero-day vulnerability in SonicWall SMA series under attack
SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
-
Network security
Eclypsium finds security issues in Palo Alto Networks NGFWs
Eclypsium researchers stressed how essential supply chain security is as threat actors increasingly target and exploit vulnerabilities in firewalls, VPNs and other edge devices.
-
Security operations and management
Cyber Safety Review Board axed in DHS cost-cutting move
Benjamine C. Huffman, acting secretary of the Department of Homeland Security under Trump, terminates the memberships for all DHS advisory committees, including the CSRB.
Search Security Definitions
- What is threat modeling?
- What is SSL (Secure Sockets Layer)?
- What is hacktivism?
- What is a private key?
- What is password cracking?
- What is a public key and how does it work?
- What is a proxy firewall?
- What is a public key certificate?