SearchSecurity

New & Notable

Gartner analysts debate ransomware payments

During Gartner's IT Symposium, analysts discussed the complex factors companies face when deciding whether or not to give into ransom demands.

5 questions to ask when creating a ransomware recovery plan

These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

'LightBasin' hackers spent 5 years hiding on telco networks

A state-sponsored hacking group has been moving undetected on the networks of more than a dozen telecommunications providers, observing traffic and collecting data for years.

Federal agencies issue warning on BlackMatter ransomware

U.S. government agencies say a new family of malware could create problems for critical infrastructure by shutting down critical networks and disrupting commerce.

Topics Covered

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • Get Started

    risk analysis

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects.

  • Get Started

    cybersecurity insurance

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to help reduce the financial risks associated with doing business online.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

SearchCloudSecurity
SearchNetworking
SearchCIO
SearchEnterpriseDesktop
SearchCloudComputing
ComputerWeekly.com
Close