SearchSecurity

New & Notable

Manage

3 steps to secure your supply chain after SolarWinds

Following the devastating SolarWinds breach, IT leaders should renew their focus on third-party risk management. Start by implementing supply chain security best practices.

Manage

Steps to control third-party supply chain risk

From third-party risk assessments to multifactor authentication, follow these steps to ensure suppliers don't end up being your enterprise cybersecurity strategy's weakest link.

News

Senate hearing: SolarWinds evidence points to Russia

Executives from Microsoft and FireEye said that there was substantial evidence pointing to Russia's role in the SolarWinds attack and no evidence found leading anywhere else.

Manage

How suppliers can help prevent supply chain attacks

Every company, large and small, must assume it is a target in the supply chain. Suppliers should follow these best practices to keep themselves and their customers protected.

Topics Covered

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access to information systems.

  • Get Started

    spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • Get Started

    cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Government information security management

    Senate hearing: SolarWinds evidence points to Russia

    Executives from Microsoft and FireEye said that there was substantial evidence pointing to Russia's role in the SolarWinds attack and no evidence found leading anywhere else.

  • Cyberespionage and nation-state cyberattacks

    Dragos: ICS security threats grew threefold in 2020

    A new report highlights the challenges facing ICS vendors today, including practices that are geared toward traditional IT and not designed for ICS security.

  • Hacker tools and techniques: Underground hacking sites

    Chinese APT used stolen NSA exploit for years

    Check Point's report details how a zero-day exploit credited to a Chinese nation-state threat group "is in fact a replica of an Equation Group exploit code-named 'EpMe.'"

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close