SearchSecurity

New & Notable

News

Detailed BlueKeep RCE explanation posted

After a description for building a remote BlueKeep exploit is posted on GitHub, experts warn that attacks in the wild are becoming more likely and users need to patch.

Problem Solve

3 steps to effective user access reviews

User entitlement reviews ensure employees only have access to essential systems and unauthorized employees -- or miscreants -- don't. Learn how to conduct an audit of user privileges.

News

New research bypasses 'pure AI' malware detection

Security researchers developed a method to make "pure AI" antimalware products classify malware as benign, but it is unclear what antimalware solutions could be considered "pure AI."

News

FTC, states agree to settle Equifax breach complaint

Under the settlement with the FTC and state attorneys general, Equifax will fork over at least $575 million in civil penalties and provide credit monitoring services to consumers.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    How to be effective in the role of a CISO

    Success in the role of CISO requires security experts to wear many hats. Couple that with changes in compliance regulations and sophisticated cyberthreats, and CISOs are left with a full plate.

  • Get Started

    Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.

  • Get Started

    Learn how to defend against island hopping attacks

    Hackers know better than to directly attack a well-defended target; learn how they use island hopping attack strategies to elude defenders -- and how best to repel them.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Emerging cyberattacks and threats

    Detailed BlueKeep RCE explanation posted

    After a description for building a remote BlueKeep exploit is posted on GitHub, experts warn that attacks in the wild are becoming more likely and users need to patch.

  • Endpoint protection and client security

    New research bypasses 'pure AI' malware detection

    Security researchers developed a method to make "pure AI" antimalware products classify malware as benign, but it is unclear what antimalware solutions could be considered "pure AI."

  • Data security breaches

    FTC, states agree to settle Equifax breach complaint

    Under the settlement with the FTC and state attorneys general, Equifax will fork over at least $575 million in civil penalties and provide credit monitoring services to consumers.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close