New & Notable

News

RSA Conference 2025

Follow SearchSecurity's RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.

Manage

Change is in the wind for SecOps: Are you ready?

Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.

Evaluate

Top 10 ransomware targets by industry

In any given year, certain industries seem to make more attractive targets for ransomware groups. But no single sector shoulders all -- or even most -- of the risk.

Manage

How to create a CBOM for quantum readiness

Quantum is on the horizon -- is your organization ready to migrate to post-quantum cryptographic algorithms? Make a CBOM to understand where risky encryption algorithms are used.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is risk exposure in business?

    Risk exposure is the quantified potential loss from currently underway or planned business activities.

  • Get Started

    What is crypto ransomware? How cryptocurrency aids attackers

    Crypto ransomware is a form of ransomware that uses cryptography to encrypt computer files so that the victim cannot access them. In exchange for the demanded ransom, the attacker claims it will tell the victimized business how to regain access to ...

  • Get Started

    What is a brute-force attack?

    A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security