New & Notable

Get Started

How to create a third-party risk management policy

NIST's Cybersecurity Framework offers some helpful tips for organizations to fortify their third-party risk management strategies. Here's how to implement them.

News

Chainalysis records 35% decrease in ransom payments in 2024

While the first half of 2024 was on pace to surpass 2023's record-setting numbers, Chainalysis found that the volume of ransom payments dropped in the second half of the year.

News

AMD, Google disclose Zen processor microcode vulnerability

AMD said CVE-2024-56161, which first leaked last month, requires an attacker to have local administrator privileges as well as developed and executed malicious microcode.

Evaluate

Cloud PAM benefits, challenges and adoption best practices

Cloud PAM helps organizations manage access to privileged accounts to keep cloud data and applications secured. Is it right for your organization?

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is Internet Key Exchange (IKE)?

    Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).

  • Get Started

    What is a certificate revocation list (CRL) and how is it used?

    A certificate revocation list (CRL) is a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date.

  • Get Started

    What is cryptology?

    Cryptology is the mathematics, such as number theory and the application of formulas and algorithms, that underpin cryptography and cryptanalysis.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security