New & Notable
Get Started
Symmetric key encryption algorithms and security: A guide
Scrambling plaintext into ciphertext is essential to ensure data cannot be read or used by the wrong people. Learn the basics of symmetric key encryption algorithms here.
News
CISA: BeyondTrust flaw CVE-2024-12686 exploited in the wild
BeyondTrust discovered the flaw last month while investigating breaches of a 'limited number' of SaaS customers at the hands of Chinese state-sponsored threat actors.
News
Ivanti zero-day patching increases amid ongoing attacks
Recent scans conducted by the Shadowserver Foundation show many organizations have patched Ivanti instances vulnerable to CVE-2025-0282 over the last week.
Get Started
Top 12 online cybersecurity courses for 2025
Our panel of experts picked the best free and paid online cybersecurity courses for professionals looking to advance their careers and for newbies breaking into the field.
Trending Topics
-
Data Security & Privacy News
December ransomware attacks slam healthcare, public services
In December, one victim organization paid a $1.5 million ransom to restore services, while another continued to experience disruptions for more than one month following an attack.
-
Threats & Vulnerabilities Evaluate
9 secure email gateway options for 2025
Finding the best email security gateway is vital to protect companies from cyber attacks. Here's a look at some current market leaders and their standout features.
-
IAM Evaluate
The basics drive 2025 identity security investments
New identity security tech might steal headlines, but Informa TechTarget's Enterprise Strategy Group analyst Todd Thiemann shows the basics get the most attention from businesses.
-
Analytics & Automation News
Microsoft enhanced Recall security, but will it be enough?
Microsoft's controversial Recall feature began rolling out to certain Windows Insiders with Copilot+ PCs in November, with more expected to participate this month.
-
Network Security Evaluate
3 network security predictions for 2025
What does 2025 have in store for network security? Analyst John Grady from Informa TechTarget's Enterprise Strategy Group shares his predictions for the upcoming year.
-
Operations & Management Problem Solve
Enterprise cybersecurity hygiene checklist for 2025
Enterprise cybersecurity hygiene must be a shared responsibility between employees and employers. Learn how both can get the job done with this checklist.
Sponsored Sites
-
Security
Transform Your Network Security: Secure, Agile, and Ready for the Future
Experience a revolution in network security with Secure Network Transformation solutions. Learn how TATA Communications’ comprehensive approach ensures unparalleled protection, performance, and flexibility for your network infrastructure.
-
Connected Enterprise
Empowering the Truly Connected Enterprise
Learn how Software AG can help your organization become a truly connected enterprise.
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
9 secure email gateway options for 2025
Finding the best email security gateway is vital to protect companies from cyber attacks. Here's a look at some current market leaders and their standout features.
-
Top 7 data loss prevention tools for 2025
-
Data security spending in 2025: Up and to the right
-
Top 4 incident response certifications to consider in 2025
-
-
Problem Solve
Enterprise cybersecurity hygiene checklist for 2025
Enterprise cybersecurity hygiene must be a shared responsibility between employees and employers. Learn how both can get the job done with this checklist.
-
How to protect against malware as a service
-
How to recover from a DDoS attack
-
Biometric privacy and security challenges to know
-
-
Manage
Top 12 online cybersecurity courses for 2025
Our panel of experts picked the best free and paid online cybersecurity courses for professionals looking to advance their careers and for newbies breaking into the field.
-
Top 15 email security best practices for 2025
-
Add gamification learning to your pen testing training playbook
-
7 DevSecOps tools to secure each step of the SDLC
-
Information Security Basics
-
Get Started
Top 12 online cybersecurity courses for 2025
Our panel of experts picked the best free and paid online cybersecurity courses for professionals looking to advance their careers and for newbies breaking into the field.
-
Get Started
10 must-have cybersecurity skills for career success in 2025
Looking to advance your cybersecurity career? Here are the skills you need to win a CISO job, land a threat hunter gig and snag other security positions in high demand.
-
Get Started
What is a public key and how does it work?
In cryptography, a public key is a large numerical value that is used to encrypt data.
Multimedia
-
News
View All -
Risk management
Experts optimistic on FCC's Cyber Trust Mark for IoT devices
The launch of the FCC's U.S. Cyber Trust Mark label for IoT devices will include internet-connected home security cameras, smart home appliances, baby monitors and more.
-
Threats and vulnerabilities
Mandiant links Ivanti zero-day exploitation to Chinese hackers
Mandiant warned users to be prepared for widespread exploitation of CVE-2025-0282 as Ivanti products have become a popular target for attackers in recent years.
-
Data security and privacy
December ransomware attacks slam healthcare, public services
In December, one victim organization paid a $1.5 million ransom to restore services, while another continued to experience disruptions for more than one month following an attack.
Search Security Definitions
- What is a public key and how does it work?
- What is a proxy firewall?
- What is a public key certificate?
- What is PKI (public key infrastructure)?
- What is passwordless authentication?
- What is identity and access management? Guide to IAM
- What is a block cipher?
- What is a stream cipher?