New & Notable
News
CrowdStrike exec apologizes to Congress, shares updates
CrowdStrike changed the way it rolls out content updates as a result of the global IT outage caused by a faulty update in July.
News
Risk & Repeat: What's next for Telegram and Pavel Durov?
Telegram made updates to its FAQ and privacy policy following Pavel Durov's arrest. But will the changes influence cybercriminals' abuse of the platform?
News
Arkansas City water treatment facility hit by cyberattack
While disruptions are limited, the attack on the water treatment facility highlights how the critical infrastructure sector remains a popular target for threat actors.
Get Started
How to use tcpreplay to replay network packet files
The suite of tools that comprise tcpreplay offers administrators a variety of network security options. Learn some of the benefits of this free utility.
Trending Topics
-
Data Security & Privacy News
Infosec experts detail widespread Telegram abuse
Cybersecurity vendors say threat activity on Telegram has grown rapidly in recent years, and they don't expect the arrest of founder and CEO Pavel Durov to change that trend.
-
Threats & Vulnerabilities News
CrowdStrike exec apologizes to Congress, shares updates
CrowdStrike changed the way it rolls out content updates as a result of the global IT outage caused by a faulty update in July.
-
IAM News
Microsoft issues first Secure Future Initiative report
In the first progress report since the launch of its Secure Future Initiative, Microsoft said it's made key improvements to identity and supply chain security.
-
Analytics & Automation News
Mastercard to acquire Recorded Future for $2.65B
Mastercard says the addition of threat intelligence vendor Recorded Future will bolster its cybersecurity services as threats against the financial sector continue to rise.
-
Network Security News
Arkansas City water treatment facility hit by cyberattack
While disruptions are limited, the attack on the water treatment facility highlights how the critical infrastructure sector remains a popular target for threat actors.
-
Operations & Management Manage
How to prepare a system security plan, with template
To help keep your systems and applications secure, a system security plan is essential. Learn how to create a plan and keep it up to date.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
DNS security best practices to implement now
DNS is a key component in any enterprise network. Auditing DNS servers and encrypting DNS traffic are just two of the steps to take to protect your organization's DNS deployment.
-
Top vulnerability management challenges for organizations
-
Microsoft Copilot for Security: 5 use cases
-
How AI could change threat detection
-
-
Problem Solve
How to prevent vendor email compromise attacks
Vendor email compromise is one of the latest email attacks to hit headlines. Learn how to prevent becoming a victim to this potentially expensive scheme.
-
Top API risks and how to mitigate them
-
Use AI threat modeling to mitigate emerging attacks
-
Too many cloud security tools? Time for consolidation
-
-
Manage
How to prepare a system security plan, with template
To help keep your systems and applications secure, a system security plan is essential. Learn how to create a plan and keep it up to date.
-
6 cybersecurity soft skills to elevate your career
-
Explaining cybersecurity tabletop vs. live-fire exercises
-
How to create an AI acceptable use policy, plus template
-
-
E-Handbook | July 2021
Mitigating risk-based vulnerability management challenges
Download -
E-Handbook | June 2021
Security observability tools step up threat detection, response
Download -
E-Handbook | January 2021
SolarWinds supply chain attack explained: Need-to-know info
Download -
E-Handbook | November 2020
Cyber insurance 101: Timely guidance on an essential tool
Download -
E-Zine | November 2020
AI cybersecurity raises analytics' accuracy, usability
Download
Information Security Basics
-
Get Started
How to use tcpreplay to replay network packet files
The suite of tools that comprise tcpreplay offers administrators a variety of network security options. Learn some of the benefits of this free utility.
-
Get Started
ASPM vs. ASOC: How do they differ?
Application security posture management and application security orchestration and correlation tools both aim to secure applications but use different methodologies.
-
Get Started
How to prepare for post-quantum computing security
One of the biggest fears about quantum computing is its ability to easily break current encryption algorithms. Learn why and how to start making quantum security preparations.
Multimedia
-
News
View All -
Threats and vulnerabilities
CrowdStrike exec apologizes to Congress, shares updates
CrowdStrike changed the way it rolls out content updates as a result of the global IT outage caused by a faulty update in July.
-
Network security
Arkansas City water treatment facility hit by cyberattack
While disruptions are limited, the attack on the water treatment facility highlights how the critical infrastructure sector remains a popular target for threat actors.
-
Identity and access management
Microsoft issues first Secure Future Initiative report
In the first progress report since the launch of its Secure Future Initiative, Microsoft said it's made key improvements to identity and supply chain security.
Security Definitions
- What is email spam and how to fight it?
- What is threat detection and response (TDR)? Complete guide
- What is network detection and response (NDR)?
- What is identity threat detection and response (ITDR)?
- What is MXDR, and do you need it?
- What is cybercrime and how can you prevent it?
- What is cloud detection and response (CDR)?
- What is an endpoint protection platform (EPP)?