New & Notable

Manage

Benefits and challenges of zero standing privileges

Zero standing privileges combines the zero-trust model with the principle of least privilege to strengthen privileged access management and reduce enterprise attack surfaces.

Manage

Making a case for the cybersecurity data fabric

When it comes to data, context is everything. Learn how a cybersecurity data fabric can supercharge a security team's ability to see the big picture.

Manage

3 types of deepfake detection technology and how they work

Think you're talking to your boss on Zoom? You might want to think again. Deepfake technology has already cost enterprises millions of dollars. Here's how to fight fire with fire.

News

Cloudflare unveils tools for safeguarding AI deployment

The cybersecurity vendor's new suite helps businesses, developers and content creators deploy AI technology at scale safely and securely.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    WAF

    A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats.

  • Get Started

    buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.

  • Get Started

    What is elliptical curve cryptography (ECC)?

    Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security