SearchSecurity

New & Notable

Evaluate

Is a cybersecurity insurance policy a worthy investment?

Variables such as third-party business partners create unique cyberthreats for organizations. Find out when a cybersecurity insurance policy is a wise investment to prevent risk.

News

Docker worm spreads cryptojacker on exposed hosts

Security researchers discovered a new Docker worm that has been targeting exposed hosts in order to spread cryptojacking malware to other containers.

Evaluate

How to choose a cybersecurity insurance provider

To vet potential cybersecurity insurance providers, there are a few questions every customer should ask. Learn more about the questions to ask and how to get the answers you need.

Evaluate

Building a penetration testing toolkit

Does your penetration testing toolkit have the proper contents? Learn the must-have tool for any pen tester, as well as specific tools for wireless, network and web app pen testing.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of login credentials that will ensure the entity is who or what it says it is across multiple platforms, applications and ...

  • Get Started

    firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a computer network.

  • Get Started

    encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Emerging cyberattacks and threats

    Docker worm spreads cryptojacker on exposed hosts

    Security researchers discovered a new Docker worm that has been targeting exposed hosts in order to spread cryptojacking malware to other containers.

  • Network device security: Appliances, firewalls and switches

    Imperva takes the blame for WAF breach

    Imperva CTO Kunal Anand posted updated information regarding the recent breach affecting Cloud WAF customers and admitted poor security controls led to the compromise.

  • Enterprise network security

    Cybersecurity threats on the rise, prey on human nature

    Cybersecurity attacks continue to rise, taking advantage of network vulnerabilities -- and human ones. First National Technology Solutions' CISO offers advice.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close