New & Notable

News

AWS launches automated service for incident response

AWS Security Incident Response, which launched ahead of the re:Invent 2024 conference this week, can automatically triage and remediate events detected in Amazon GuardDuty.

Manage

How to build an effective third-party risk assessment framework

Don't overlook the threats associated with connecting vendors and partners to internal systems. Do your due diligence and use third-party risk assessments to prevent supply chain attacks.

Evaluate

How AI is reshaping threat intelligence

As promising as AI technology is for threat intelligence, organizations grapple with a long learning curve and other challenges that could impede successful adoption.

News

New York fines Geico, Travelers $11.3M over data breaches

The two insurance giants were fined millions by New York state regulators and are required to enhance security protocols around authentication and penetration testing.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is obfuscation and how does it work?

    Obfuscation means to make something difficult to understand. Programming code is often obfuscated to protect intellectual property or trade secrets, and to prevent an attacker from reverse engineering a proprietary software program.

  • Get Started

    What is IPsec (Internet Protocol Security)?

    IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.

  • Get Started

    What is Extensible Authentication Protocol (EAP)?

    Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security