SearchSecurity

New & Notable

Manage

Is the Spectre variant 2 mitigation worth it?

Fixes for the Spectre variant 2 vulnerability affect system performance, so some in the tech sector wonder whether they're worth it. Expert Michael Cobb examines that question.

News

Kaseya MSP clients hit with GandCrab ransomware

GandCrab ransomware infected several managed service providers, thanks to an old a ConnectWise manage plugin vulnerability, but a new decryptor tool is offering relief to victims.

Evaluate

Can a zero-trust approach fill the security perimeter void?

With the enterprise perimeter a mere memory, how can enterprises hope to secure their mission-critical data and systems?

Manage

How Mirai and Gafgyt variant botnets target IoT devices

New variants of popular botnets were found targeting IoT devices by Palo Alto Networks' Unit 42. Discover how these variants differ from their sources and what new risks they pose.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    How to prepare your organization for the CCPA

    Organizations that handle California consumer data have a year to comply with CCPA. Expert Steven Weil discusses what enterprises need to know about the California privacy law.

  • Get Started

    SOAR (Security Orchestration, Automation and Response)

    SOAR (Security Orchestration, Automation and Response) is a technology stack of compatible software programs that allow an organization to collect data about security threats and alerts from multiple sources and respond to low-level security events ...

  • Get Started

    COBIT

    COBIT is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Data security strategies and governance

    CrowdStrike threat report highlights the need for speed

    CrowdStrike's annual global threat report highlights why speed is critical for cybersecurity defenders. Experts sound off on key findings, including the rise of 'big game hunting.'

  • Malware, virus, Trojan and spyware protection and removal

    Kaseya MSP clients hit with GandCrab ransomware

    GandCrab ransomware infected several managed service providers, thanks to an old a ConnectWise manage plugin vulnerability, but a new decryptor tool is offering relief to victims.

  • Security automation systems, tools and tactics

    Palo Alto Networks to acquire Demisto for $560 million

    Palo Alto Networks announced its plan of acquiring SOAR vendor Demisto for $560 million to accelerate its Application Framework strategy and beef up security operations automation.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close