SearchSecurity

New & Notable

News

Google scrubbing search results for Firebase exposures

A security researcher found that Google's search engine hides results for misconfigured Firebase databases that are publicly accessible on the internet.

Manage

Privacy compliance driving IT security

As companies scramble to comply with consumer data privacy compliance mandates, like GDPR, CCPA and others on the horizon, IT security will shoulder much of the process burden.

Get Started

How a CISO shapes the network security roadmap

The role of CISO in network security goes beyond risk management. It also requires understanding compliance regulations and business needs, as well as the ability to communicate security policies to nontechnical employees.

Evaluate

Role of AI in cybersecurity and 6 possible product options

Cyberthreats loom large in this modern IT environment. Explore the six most common roles of AI in cybersecurity and the products synthesizing them.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks -- usually the ...

  • Get Started

    quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by performing calculations that were previously impossible at unmatched speeds.

  • Get Started

    How a CISO shapes the network security roadmap

    The role of CISO in network security goes beyond risk management. It also requires understanding compliance regulations and business needs, as well as the ability to communicate security policies to nontechnical employees.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close