New & Notable

News

Black Basta ransomware leak sheds light on targets, tactics

VulnCheck found the ransomware gang targeted CVEs in popular enterprise products from Microsoft, Citrix, Cisco, Fortinet, Palo Alto Networks, Confluence Atlassian and more.

Get Started

WAF vs. RASP for web app security: What's the difference?

Web application firewalls use a negative security model, while runtime application self-protection tools use a positive security model. Which is better at keeping apps secure?

News

Dragos: Ransomware attacks against industrial orgs up 87%

Ransomware attacks continue to be a major pain point for industrial organizations, as the sector has historically struggled with vulnerability management.

News

Apple pulls Advanced Data Protection in UK, sparking concerns

Privacy and security concerns mount, as Apple pulls the end-to-end encryption feature for users located in the U.K. following pressures from the government.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    WAF vs. RASP for web app security: What's the difference?

    Web application firewalls use a negative security model, while runtime application self-protection tools use a positive security model. Which is better at keeping apps secure?

  • Get Started

    application whitelisting

    Application allowlisting, previously known as 'application whitelisting,' is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system.

  • Get Started

    What is Transport Layer Security (TLS)?

    Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security