New & Notable

Problem Solve

QR code phishing: 14 quishing prevention tips

Quishing is an offputting word for an on-the-rise attack method. Learn how to defend against it.

Get Started

How to create a data breach response plan, with free template

A data breach response plan outlines how a business reacts to a breach. Follow these six steps, and use our free template to develop your organization's plan.

Manage

Data security and identity security themes at RSAC 2025

Check out what Enterprise Strategy Group analyst Todd Thiemann has on his agenda for RSA Conference 2025.

Evaluate

Ransomware payments: Considerations before paying

To pay or not to pay -- that's the question after a ransomware attack. Law enforcement recommends against it, but that doesn't stop some companies from paying up.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    How to report ransomware attacks: Steps to take

    The Cybersecurity and Infrastructure Security Agency and FBI recommend reporting ransomware attacks to the authorities as soon as possible.

  • Get Started

    What is a hacker?

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Get Started

    WAF

    A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security