SearchSecurity

New & Notable

News

Microsoft Exchange Server zero-days exploited in the wild

Both the Cybersecurity and Infrastructure Security Agency and National Security Agency advise patching the Exchange Server zero-days immediately.

News

Accellion FTA attacks claim more victims

More details have emerged about the Accellion FTA attacks since the December disclosure, including possible threat groups behind the breach and a growing list of victims.

Problem Solve

Don't let BEC be a pain in your business's neck

Technical controls are at the heart of preventing successful business email compromise attacks. Learn about those and extra considerations to keep your business secure.

Manage

Tackling the 10 most common security challenges

Common security threats range from insider threats to advanced persistent threats, and they can bring an organization to its knees unless its in-house security team is aware of them and ready to respond.

Topics Covered

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or government entity.

  • Get Started

    virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works.

  • Get Started

    spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close