SearchSecurity

New & Notable

News

DARPA's hardware protection program may face challenges

DARPA is still in the early prototype stages of its SSITH program, but the aim is to develop an open source chip able to block hardware attacks and reduce the need for software patches.

Problem Solve

Top methods to prevent cross-site scripting attacks

To prevent cross-site scripting attacks, software developers must validate user input and encode output. Review characters to filter out, as well as sources and sinks to avoid.

Evaluate

Zero-day vulnerability vs. zero-day exploit

A zero-day vulnerability isn't the same as a zero-day exploit. Learn the difference between these two zero-day terms, as well as why they should be high priority on any CISO's patching list.

Local Texas governments hit by ransomware attack

Ransomware attacks hit 22 municipalities around Texas, most of which appear to be smaller local governments, but the details surrounding the attacks are still unclear.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an organization's IT and business systems are monitored, managed and protected; the certification is presented after completion of a...

  • Get Started

    New network traffic analysis tools focus on security

    Companies have used traffic data analytics to improve bandwidth and network performance. Now, though, a new class of tools taps network data to improve security.

  • Get Started

    How traffic analytics now helps secure the network

    Gartner just produced its first-ever guide to network traffic analytics security tools. Learn how the analysis of network traffic is broadening to include network security.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Vendor Resources

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Government information security management

    Local Texas governments hit by ransomware attack

    Ransomware attacks hit 22 municipalities around Texas, most of which appear to be smaller local governments, but the details surrounding the attacks are still unclear.

  • Mobile security threats and prevention

    Bluetooth PoC attack could leak information

    Security researchers discovered a way to force Bluetooth devices to use easy-to-crack encryption keys, which could lead to man-in-the-middle attacks and information leaks.

  • Cyberespionage and nation-state cyberattacks

    Confidence in 2020 election security mixed at DEF CON

    Confidence in the security of the 2020 election spanned the gamut, depending on who you asked at DEF CON's Voting Village, with local officials more optimistic than technologists.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close