SearchSecurity

New & Notable

Evaluate

Experts debate XDR market maturity and outlook

Is extended detection response still all buzz and no bite? Experts disagree on whether XDR qualifies as a legitimate market yet or still has a ways to go.

News

Turla deploying 'secondary' backdoor in state-sponsored attacks

Cisco Talos said hackers connected to the Russian APT Turla are using a new piece of malware to get persistent access on infected networks in the U.S., Germany and Afghanistan.

News

Marcus & Millichap hit with possible BlackMatter ransomware

The real estate firm confirmed in a SEC filing this week that it had suffered a recent cyber attack but claimed there was no 'material disruption' to its business.

News

Symantec: Staging activity observed on Exchange servers

Threat actors appear to be targeting Microsoft Exchange servers with pre-ransomware activity, including one attempt to exfiltrate data.

Topics Covered

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    PII

    Personally identifiable information (PII) is any data that could potentially identify a specific individual.

  • Get Started

    sandbox

    A sandbox is an isolated testing environment that enables users to run programs or open files without affecting the application, system or platform on which they run.

  • Get Started

    RBAC

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

SearchCloudSecurity
SearchNetworking
SearchCIO
SearchEnterpriseDesktop
SearchCloudComputing
ComputerWeekly.com
Close