New & Notable

Manage

Key software patch testing best practices

Every company has to update and patch its software, but without careful testing, serious problems can occur. Here's how to make sure you're following the right steps.

Evaluate

Pros and cons of 7 breach and attack simulation tools

Breach and attack simulation software can significantly beef up an organization's network defense strategy. But not all tools are made equally.

News

CISA: Midnight Blizzard obtained federal agency emails

CISA ordered U.S. federal agencies to reset any credentials exposed by Midnight Blizzard's breach against Microsoft and notify CISA in the case of a known or suspected compromise.

News

Palo Alto Networks discloses RCE zero-day vulnerability

Threat actors have exploited the remote code injection flaw, which affects the GlobalProtect gateway in Palo Alto Networks' PAN-OS software, in a 'limited' number of attacks.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    ID management

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to technology resources.

  • Get Started

    single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications.

  • Get Started

    cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems to understand how they work and to find and improve techniques for defeating or weakening them.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close