New & Notable


Companies must train their SOC teams well to prevent breaches

SOC teams can have all the latest and greatest cybersecurity tools, but unless they have the proper training, it won't be enough to mitigate an attack.


Risk & Repeat: FBI's web shell removal raises questions

The FBI accessed computers -- without the knowledge or consent of the owners -- to remove hundreds of web shells placed in vulnerable Microsoft Exchange servers.


Applus inspection systems still down following malware attack

Applus Technologies said it stopped a malware attack two weeks ago, but systems are still down as eight states are forced to extend vehicle inspection dates.


Nation-state hacker indictments: Do they help or hinder?

While there are some benefits to filing criminal charges against nation-state actors, infosec experts say thus far, indictments haven't reduced cyber attacks.

Topics Covered

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started


    Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of information.

  • Get Started

    denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to access computer systems, devices, services or other IT resources.

  • Get Started

    user authentication

    User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer of credentials during interactions on a network to confirm a user's authenticity.

View All Get Started


Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity