New & Notable

Manage

How to build an application security program

A well-defined application security program that includes multilayer software testing, SBOMs, and documentation and standards is vital to protect apps from threat actors.

Manage

Incident response for web application attacks

Web app security is like learning to ride a bike -- expect to struggle before getting it right. But don't be disheartened; learn from prior incidents to improve controls.

Get Started

What are the most common digital authentication methods?

How an organization authenticates users and devices is a hugely important piece in the cybersecurity puzzle. Get to know the various forms of digital authentication.

Get Started

SEC cybersecurity disclosure rules, with checklist

Public companies must regularly share information about their cybersecurity practices and disclose details of material cyberincidents. Learn how to comply.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is a pass-the-hash attack?

    A pass-the-hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.

  • Get Started

    What is a rootkit?

    A rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.

  • Get Started

    What is a copyright?

    Copyright is a legal term describing ownership or control of the rights to use and distribute certain works of creative expression, including books, video, motion pictures, musical compositions and computer programs.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security