New & Notable

News

Eclypsium finds security issues in Palo Alto Networks NGFWs

Eclypsium researchers stressed how essential supply chain security is as threat actors increasingly target and exploit vulnerabilities in firewalls, VPNs and other edge devices.

News

Cyber Safety Review Board axed in DHS cost-cutting move

Benjamine C. Huffman, acting secretary of the Department of Homeland Security under Trump, terminates the memberships for all DHS advisory committees, including the CSRB.

Evaluate

Top 10 security certifications

A consensus of industry professionals rank these 10 security certifications as the most coveted by employers and security pros -- plus links to 10 vendor security certifications.

News

Risk & Repeat: What is the future of CISA?

South Dakota Gov. Kristi Noem, who is President Donald Trump's nominee for DHS secretary, said during a recent confirmation hearing that CISA should be 'smaller.'

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is threat modeling?

    Threat modeling is the systematic process of identifying threats to and vulnerabilities in software applications, and then defining countermeasures to mitigate those threats and vulnerabilities to better protect business processes, networks, systems...

  • Get Started

    What is hacktivism?

    Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason.

  • Get Started

    What is a private key?

    A private key, also known as a secret key, is a variable in cryptography used with an algorithm to encrypt or decrypt data.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security