New & Notable
News
CISA, FBI warn of Ghost/Cring ransomware attacks
Ghost is a China-based financially motivated ransomware group that has launched attacks against organizations in more than 70 countries -- including its own.
Get Started
Penetration testing vs. vulnerability scanning: What's the difference?
Confused by the distinctions between penetration testing and vulnerability scanning? You're not alone. Learn the key differences between the two and when to use each.
Manage
9 tips for migrating between managed SOC providers
Switching between managed SOCs can be daunting, but with proper planning, organizations can successfully navigate it. One important tip: Document everything.
News
Palo Alto Networks PAN-OS vulnerability exploited in the wild
Palo Alto Networks says threat actors used a publicly available PoC exploit in attack attempts against firewall customers with PAN-OS management interfaces exposed to the internet.
Trending Topics
-
Data Security & Privacy Evaluate
Entrust sells certificate business: Implications and actions
Entrust selling its certificate business to Sectigo isn't the only change that enterprises will face when it comes to the future of digital certificates.
-
Threats & Vulnerabilities News
Palo Alto Networks PAN-OS vulnerability exploited in the wild
Palo Alto Networks says threat actors used a publicly available PoC exploit in attack attempts against firewall customers with PAN-OS management interfaces exposed to the internet.
-
IAM Evaluate
Benefits and challenges of passkeys in the enterprise
Passkeys overcome some of the critical security vulnerabilities plaguing passwords. But enterprises face some new challenges when deploying the authentication technology.
-
Analytics & Automation News
Risk & Repeat: DeepSeek security issues emerge
The introduction of DeepSeek's new generative AI models has been met with fervor, but security issues have created apparent challenges for the Chinese startup.
-
Network Security Get Started
How to use pfSense: Use cases and initial configurations
Open source firewall and routing software pfSense offers a compelling mix of capabilities that can work for organizations large and small.
-
Operations & Management Manage
9 tips for migrating between managed SOC providers
Switching between managed SOCs can be daunting, but with proper planning, organizations can successfully navigate it. One important tip: Document everything.
Sponsored Sites
-
Cybersecurity
Kaspersky Next: Cybersecurity Redefined
-
Connected Enterprise
Empowering the Truly Connected Enterprise
Learn how Software AG can help your organization become a truly connected enterprise.
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Entrust sells certificate business: Implications and actions
Entrust selling its certificate business to Sectigo isn't the only change that enterprises will face when it comes to the future of digital certificates.
-
Benefits and challenges of passkeys in the enterprise
-
Top 21 Kali Linux tools and how to use them
-
Comparing top identity and access management certifications
-
-
Problem Solve
How to build an API security strategy
Lax API protections make it easier for threat actors to steal data, inject malware and perform account takeovers. An API security strategy helps combat this.
-
Enterprise cybersecurity hygiene checklist for 2025
-
How to protect against malware as a service
-
How to recover from a DDoS attack
-
-
Manage
9 tips for migrating between managed SOC providers
Switching between managed SOCs can be daunting, but with proper planning, organizations can successfully navigate it. One important tip: Document everything.
-
What is challenge-response authentication?
-
Why enterprises need IAM -- and how to prosper from it
-
How to build an effective purple team playbook
-
Information Security Basics
-
Get Started
What is Transport Layer Security (TLS)?
Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.
-
Get Started
Penetration testing vs. vulnerability scanning: What's the difference?
Confused by the distinctions between penetration testing and vulnerability scanning? You're not alone. Learn the key differences between the two and when to use each.
-
Get Started
What is a checksum?
A checksum is a value that represents the number of bits in a transmission message. IT professionals use it to detect high-level errors within data transmissions.
Multimedia
-
News
View All -
Threat detection and response
CISA, FBI warn of Ghost/Cring ransomware attacks
Ghost is a China-based financially motivated ransomware group that has launched attacks against organizations in more than 70 countries -- including its own.
-
Threats and vulnerabilities
Palo Alto Networks PAN-OS vulnerability exploited in the wild
Palo Alto Networks says threat actors used a publicly available PoC exploit in attack attempts against firewall customers with PAN-OS management interfaces exposed to the internet.
-
Threat detection and response
Salt Typhoon compromises telecom providers' Cisco devices
Salt Typhoon's latest campaign exploits older vulnerabilities in Cisco edge devices to gain access to the networks of several telecom companies, including two based in the U.S.
Search Security Definitions
- What is a checksum?
- What is Transport Layer Security (TLS)?
- What is an attack vector?
- What is email spoofing?
- What is challenge-response authentication?
- What is defense in depth?
- What are social engineering attacks?
- What is a botnet?