Security Resources

Looking for something else?

+ Show More

Security Resources News

View All News

Security Resources Get Started

Bring yourself up to speed with our introductory content

  • evil twin

    An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot. Continue Reading

  • two-factor authentication (2FA)

    Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. Continue Reading

  • multifactor authentication (MFA)

    Multifactor authentication is one of the most cost-effective mechanisms a business can deploy to protect digital assets and customer data. Continue Reading

View All Get Started

Evaluate Security Resources Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Security Resources

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security Resources Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close