SearchSecurity

New & Notable

News

Cybersecurity leaders back law for critical infrastructure

In the wake of cyberattacks like Colonial Pipeline, U.S. senators want a national law requiring critical infrastructure companies to report cybersecurity incidents to CISA.

Problem Solve

How to prevent ransomware: 6 key steps to safeguard assets

Ransomware can cost companies billions in damage. Incorporate these ransomware prevention best practices to keep attackers out.

News

Autodiscover flaw in Microsoft Exchange leaking credentials

Guardicore found that exploiting a design flaw in Autodiscover allowed it to capture 372,00 Windows domain credentials and nearly 97,000 unique application credentials.

Evaluate

Experts debate XDR market maturity and outlook

Is extended detection response still all buzz and no bite? Experts disagree on whether XDR qualifies as a legitimate market yet or still has a ways to go.

Topics Covered

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.

  • Get Started

    NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

  • Get Started

    PII

    Personally identifiable information (PII) is any data that could potentially identify a specific individual.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

SearchCloudSecurity
SearchNetworking
SearchCIO
SearchEnterpriseDesktop
SearchCloudComputing
ComputerWeekly.com
Close