SearchSecurity

New & Notable

News

Risk & Repeat: Expired certificates loom amid government shutdown

This week's Risk & Repeat podcast looks at the expiration of more than 80 TLS certificates for U.S. government websites amid the ongoing government shutdown.

Manage

Supporting TLS 1.3 means adding enough key entropy

Cryptographic entropy is necessary to secure session encryption keys in TLS 1.2, but RSA key transport is not supported in TLS 1.3. Discover the causes for concern with Judith Myerson.

Manage

How BGPsec is involved with internet traffic control

The use of BGPsec protocols was found after looking into threat actors in China that controlled U.S. internet traffic. Discover how this technique works and how it can be mitigated.

Evaluate

A look at the security of cloud databases

Unsecured Google Firebase databases are similar to misconfigured AWS S3 buckets, but there are key differences. Expert Rob Shapland discusses the risks of unsecured cloud databases.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    Customer identity and access management: Why now and how?

    There's an important distinction between consumers and customers; just as crucial is understanding the difference between customer IAM and traditional IAM.

  • Get Started

    brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than ...

  • Get Started

    spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; often, the first indication a user has that a computing device has been infected with spyware is a noticeable reduction in ...

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Security automation systems, tools and tactics

    Why enterprises need a game plan for automating security

    Security experts sound off on the importance and benefits of automating security, and highlight factors to be considered before implementing SOAR tools.

  • Malware, virus, Trojan and spyware protection and removal

    Ryuk has earned $3.7 million in ransomware payments

    Cybersecurity vendors CrowdStrike and FireEye both published new research that shows an increase in Ryuk ransomware attacks on enterprises, which have earned hackers $3.7 million.

  • Emerging cyberattacks and threats

    Global DNS hijacking attacks attributed to Iran

    FireEye researchers investigating a DNS hijacking campaign against governments and telecom companies said those who are potential targets of Iran should take precautions.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close