SearchSecurity

New & Notable

Evaluate

BSA rolls out framework for secure software development

BSA rolled out a new secure software development framework in an effort to promote best practices for secure software development and improve security for all.

Get Started

Why EDR technologies are essential for endpoint protection

In this post-perimeter era, endpoint detection and response tools can provide essential protection to thwart advanced persistent threats. Learn what EDR offers.

Get Started

New EDR capabilities to the rescue

Malware, APTs and other threats are getting smarter, but so are endpoint detection and response products. Learn what the latest versions can do to keep threats away.

News

Google discusses making Android devices into 2FA keys

Google product manager Christiaan Brand discusses the journey to making 1.5 billion Android devices work as 2FA security keys and the plan for the future.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    Why EDR technologies are essential for endpoint protection

    In this post-perimeter era, endpoint detection and response tools can provide essential protection to thwart advanced persistent threats. Learn what EDR offers.

  • Get Started

    New EDR capabilities to the rescue

    Malware, APTs and other threats are getting smarter, but so are endpoint detection and response products. Learn what the latest versions can do to keep threats away.

  • Get Started

    Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Two-factor and multifactor authentication strategies

    Google discusses making Android devices into 2FA keys

    Google product manager Christiaan Brand discusses the journey to making 1.5 billion Android devices work as 2FA security keys and the plan for the future.

  • Information security laws, investigations and ethics

    White House and commerce secretary enact Huawei ban

    U.S. businesses are barred from dealing with Huawei following an executive order from the White House and the additions of Huawei and its affiliates to a trade blacklist.

  • Emerging cyberattacks and threats

    How to respond to the new Intel chip flaws

    Another set of side channel vulnerabilities were discovered in Intel chips. Security researchers explain the risks posed by the flaws and offer advice on mitigation steps.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close