New & Notable

News

CISA, FBI warn of Ghost/Cring ransomware attacks

Ghost is a China-based financially motivated ransomware group that has launched attacks against organizations in more than 70 countries -- including its own.

Get Started

Penetration testing vs. vulnerability scanning: What's the difference?

Confused by the distinctions between penetration testing and vulnerability scanning? You're not alone. Learn the key differences between the two and when to use each.

Manage

9 tips for migrating between managed SOC providers

Switching between managed SOCs can be daunting, but with proper planning, organizations can successfully navigate it. One important tip: Document everything.

News

Palo Alto Networks PAN-OS vulnerability exploited in the wild

Palo Alto Networks says threat actors used a publicly available PoC exploit in attack attempts against firewall customers with PAN-OS management interfaces exposed to the internet.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is Transport Layer Security (TLS)?

    Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.

  • Get Started

    Penetration testing vs. vulnerability scanning: What's the difference?

    Confused by the distinctions between penetration testing and vulnerability scanning? You're not alone. Learn the key differences between the two and when to use each.

  • Get Started

    What is a checksum?

    A checksum is a value that represents the number of bits in a transmission message. IT professionals use it to detect high-level errors within data transmissions.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security