New & Notable


Bluetooth implementations affected by new vulnerability

Bluetooth devices might be at risk after a new Bluetooth vulnerability was found targeting firmware and operating system software drivers. Learn how it works and can be mitigated.


Firefox Monitor to alert users when visiting a breached site

The promised integration with Have I Been Pwned is expanding in Firefox Monitor with new breach alerts when a user visits a recently compromised website.


BlackBerry acquires Cylance for $1.4 billion

BlackBerry made its strongest move yet toward enterprise security with a $1.4 billion acquisition of cybersecurity startup Cylance, which specializes in AI-powered threat protection.


Risk & Repeat: Are we winning the war on cybercrime?

On this week's Risk & Repeat podcast, Chet Wisniewski of Sophos discusses his company's latest research and explains why there's reason for optimism in the war on cybercrime.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a challenge or question, and another entity provides a valid response to be authenticated.

  • Get Started

    Following NIST guidelines for better incident response

    The NIST incident response plan involves four phases enterprises can take to improve security incident handling. Expert Mike O. Villegas reviews each step.

  • Get Started

    Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.

View All Get Started


Videos, Podcasts and Photo Stories

Blog: Security Bytes

Sections from across SearchSecurity