SearchSecurity

New & Notable

News

Slilpp marketplace goes dark following government takedown

Slilpp, a massive dark web emporium for buying and selling stolen credentials, has been pulled offline by an international law enforcement takedown.

Evaluate

Top 5 benefits of a new cybersecurity market model

Companies are struggling to identify the cybersecurity technology that would actually be useful for their use cases. It's time for a new market model around efficacy instead.

News

Securolytics COO charged in Georgia hospital cyber attack

Details on the cyber attack are scarce, but according to the indictment, Vikas Singla allegedly attempted to steal data and disrupt the hospital's phone system.

News

Cisco Talos: Exchange Server flaws accounted for 35% of attacks

More than one third of incidents recorded by Cisco Talos in the past three months were related to four Microsoft Exchange Server zero-days first revealed in March.

Topics Covered

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent or mitigate the effects of threats to the system.

  • Get Started

    5 steps to achieve a risk-based security strategy

    Learn about the five steps to implement a risk-based security strategy that will help naturally deliver compliance as a consequence of an improved security posture.

  • Get Started

    social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations...

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

SearchCloudSecurity
SearchNetworking
SearchCIO
SearchEnterpriseDesktop
SearchCloudComputing
ComputerWeekly.com
Close