New & Notable
News
RSA Conference 2025
Follow SearchSecurity's RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
Evaluate
Top 10 ransomware targets by industry
In any given year, certain industries seem to make more attractive targets for ransomware groups. But no single sector shoulders all -- or even most -- of the risk.
Manage
How to create a CBOM for quantum readiness
Quantum is on the horizon -- is your organization ready to migrate to post-quantum cryptographic algorithms? Make a CBOM to understand where risky encryption algorithms are used.
Trending Topics
-
Data Security & Privacy Manage
DLP vs. DSPM: What's the difference?
Data loss prevention and data security posture management tools give organizations powerful features to protect data in the cloud and on-premises.
-
Threats & Vulnerabilities Problem Solve
Top 5 ransomware attack vectors and how to avoid them
Protecting your organization against ransomware attack entryways could mean the difference between staying safe or falling victim to a devastating breach.
-
IAM Problem Solve
How to create custom sudo configuration files in /etc/sudoers
Sudo offers administrators a lot of flexibility. Creating custom sudo configurations can go a long way toward easing management and service upgrade challenges.
-
Analytics & Automation Manage
Change is in the wind for SecOps: Are you ready?
Attackers have historically had time on their side, outpacing defenders who have struggled to keep up. Agentic AI appears poised to change the game.
-
Network Security Problem Solve
IPsec vs. SSL VPNs: What are the differences?
New technologies get all the headlines, but VPNs aren't going away anytime soon. Speed and security are among the factors to consider when determining what type of VPN to use.
-
Operations & Management News
RSA Conference 2025
Follow SearchSecurity's RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
Sponsored Sites
-
Security
One Identity | Integrated Cybersecurity for all Your Identities
Learn how One Identity provides integrated cybersecurity solutions, delivering a truly unified identity platform and streamlining management across on-premises and cloud resources.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
ransomware
Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.
-
Ransomware negotiation: Does it work, and should you try it?
-
Ransomware payments: Considerations before paying
-
How to report ransomware attacks: Steps to take
-
-
Problem Solve
Top 5 ransomware attack vectors and how to avoid them
Protecting your organization against ransomware attack entryways could mean the difference between staying safe or falling victim to a devastating breach.
-
How to create custom sudo configuration files in /etc/sudoers
-
How to prevent and protect against ransomware
-
QR code phishing: 14 quishing prevention tips
-
-
Manage
DLP vs. DSPM: What's the difference?
Data loss prevention and data security posture management tools give organizations powerful features to protect data in the cloud and on-premises.
-
Change is in the wind for SecOps: Are you ready?
-
How to create a CBOM for quantum readiness
-
Tips to find cyber insurance coverage in 2025
-
Information Security Basics
-
Get Started
What is risk exposure in business?
Risk exposure is the quantified potential loss from currently underway or planned business activities.
-
Get Started
What is crypto ransomware? How cryptocurrency aids attackers
Crypto ransomware is a form of ransomware that uses cryptography to encrypt computer files so that the victim cannot access them. In exchange for the demanded ransom, the attacker claims it will tell the victimized business how to regain access to ...
-
Get Started
What is a brute-force attack?
A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems.
Multimedia
-
News
View All -
Organizations Lack Incident Response Plans, but Answers Are on the Way
Developing strong incident response plans remains an area that requires significant improvement. Here are some shortcomings and how to address them.
-
7 RSAC 2025 Cloud Security Sessions You Don't Want to Miss
Some of the brightest minds in the industry will discuss how to strengthen cloud security.
-
RSAC Unveils Keynote Speaker Slate for RSAC (TM) 2025 Conference
RSAC, the company behind the world's largest and most influential cybersecurity conference, today announced its current lineup of keynote speakers for its upcoming RSAC™ 2025 Conference, taking place at the Moscone Center in San Francisco from April...
Search Security Definitions
- What is risk exposure in business?
- What is ransomware? Definition and complete guide
- What is crypto ransomware? How cryptocurrency aids attackers
- What is a brute-force attack?
- What is Pretty Good Privacy and how does it work?
- What is corporate governance?
- What is cloud security?
- What is a side-channel attack?