New & Notable


Experts question Google Chrome privacy after changes

Google Chrome sign-in changes are being criticized by experts, and poor communication from Google has led to more confusion about user privacy and consent.


Cybersecurity Tech Accord doubles in size

Microsoft announced that, six months after its introduction, the Cybersecurity Tech Accord has nearly doubled its membership and partnered with the Global Forum on Cyber Expertise.


How local government cybersecurity can be improved

When considering a local government cybersecurity program, companies must understand the dangers of not having one. Matt Pascucci explains why a program designed to monitor the public sector is crucial.

Problem Solve

Monitor privileged execution to avoid Sanny malware

Changes to the Sanny malware were recently discovered by FireEye researchers. Learn who is at risk and how elevated privileges can help protect you with Nick Lewis.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    Payload (computing)

    The term payload, when used in the context of networking or telecommunications, is the data carried inside of a packet (or other network protocol data units like frames or segments).

  • Get Started

    A look at the new techniques used in SynAck ransomware

    A technique called Process Doppelgänging was used by the SynAck ransomware to bypass security software. Expert Michael Cobb explains how this technique works and why it's unique.

  • Get Started

    access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

View All Get Started


Videos, Podcasts and Photo Stories

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • IoT security issues

    Survey finds security pros believe AI is key

    A global Ponemon survey of security professionals found that many believe artificial intelligence and machine learning technology will improve enterprise and IoT security.

  • Government information security management

    White House details new Cyber Strategy goals

    The new National Cyber Strategy released by the White House details plans for improving cybersecurity and garnered positive early reviews from experts for its comprehensiveness.

  • Information security laws, investigations and ethics

    Authors of the Mirai botnet help FBI, avoid jail

    News roundup: The Mirai botnet creators will not serve time in prison after they worked with the FBI. Plus, the Department of Defense updated its cyber strategy, and more.