New & Notable


Online education vendor K12 hit with ransomware, pays ransom

A spokesperson for K12 told SearchSecurity that based on the current status of the investigation, the attack did not affect student devices or school networks.


8 ways a SOC can benefit your enterprise

A security operations center can help lessen the fallout of a data breach, but its business benefits go much further than that. Here are eight SOC benefits to consider.


Compare the pros and cons of remote browser isolation

Remote browser isolation benefits end-user experience and an organization's network security. Compare the pros, cons and cost challenges before investing in the zero-trust approach.


5 SecOps certifications, training for IT pros

Explore five SecOps certifications available to IT professionals looking to demonstrate and enhance their knowledge of threat monitoring and incident response.

Topics Covered

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    ID management

    Identity management (ID management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.

  • Get Started


    SOAR (Security Orchestration, Automation and Response) is a solution stack of compatible software programs that allow an organization to collect data about security threats, and respond to low-level security events without human assistance.

  • Get Started

    Certified Information Systems Auditor (CISA)

    The Certified Information Systems Auditor (CISA) is a certification and globally recognized standard for appraising an IT auditor's knowledge, expertise and skill in assessing vulnerabilities and instituting IT controls in an enterprise environment. 

View All Get Started


Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity