New & Notable

Microsoft alerts healthcare organizations of looming threats

Microsoft warned "dozens" of hospitals with vulnerable gateway and VPN software that an infamous ransomware group known as REvil is scanning the internet for such flaws.


AI security questions to ask when buying tools

Experts offer four concerns for enterprises and vendors to discuss in order to deploy and run AI-based cybersecurity tools.


Risk & Repeat: Zoom tackles security issues

This week's Risk & Repeat podcast looks at several security issues Zoom faced over the last week, which led to questions about the company's privacy and security practices.


Zoom patches zero-day flaws, pledges better security

An ex-NSA hacker reported two zero-day vulnerabilities on his blog Wednesday. One of them can give an attacker control of a user's webcam and microphone. Zoom fixed both flaws quickly.

Topics Covered

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification which indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.

  • Get Started

    What is Cybersecurity? Everything You Need to Know

    Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks.

  • Get Started

    Differences in LAN and WAN security

    Given the differences in the security of LAN and WAN, enterprises need to guard against insider threats, secure against unauthorized access and potentially secure the edge, too.

View All Get Started


Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity