New & Notable

News

Cyber insurers address ransom reimbursement policy concerns

In a recent op-ed for The Financial Times, U.S. Deputy National Security Advisor Anne Neuberger wrote that reimbursing ransom payments is a 'troubling practice that must end.'

News

DOJ charges 5 alleged Scattered Spider members

The defendants, charged for conducting alleged phishing scams across the U.S., are suspected members of a prolific threat group responsible for last year's casino attacks.

Get Started

How to test firewall rules with Nmap

Using Nmap to identify potential shortfalls in the rules used to govern firewall performance gives teams an easy and cost-effective way to plug holes in their security frameworks.

Evaluate

U.S. data privacy protection laws: 2025 guide

Growing concerns over the processing, storage and protection of personal data, plus the GenAI effect, are leading to the passage of new local and regional privacy regulations.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is endpoint detection and response (EDR)?

    Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints.

  • Get Started

    How to test firewall rules with Nmap

    Using Nmap to identify potential shortfalls in the rules used to govern firewall performance gives teams an easy and cost-effective way to plug holes in their security frameworks.

  • Get Started

    4 types of access control

    Access management is the gatekeeper, making sure a device or person can gain entry only to the systems or applications to which they have been granted permission.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security