New & Notable

News

Russian hackers exploit Firefox, Windows zero-days in wild

RomCom threat actors chain two Firefox and Windows zero-day vulnerabilities together in order to execute arbitrary code in vulnerable Mozilla browsers.

News

AWS CISO details automated cybersecurity tools for customers

Chris Betz, CISO at AWS, discusses how three internal tools are designed to automatically identify and mitigate threats for the cloud giant's customers.

News

Volexity details Russia's novel 'Nearest Neighbor Attack'

The security company warned that the new attack style highlights the importance of securing Wi-Fi networks, implementing MFA and patching known vulnerabilities.

News

Cyber insurers address ransom reimbursement policy concerns

In a recent op-ed for The Financial Times, U.S. Deputy National Security Advisor Anne Neuberger wrote that reimbursing ransom payments is a 'troubling practice that must end.'

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is IPsec (Internet Protocol Security)?

    IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.

  • Get Started

    What is Extensible Authentication Protocol (EAP)?

    Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.

  • Get Started

    What is endpoint detection and response (EDR)?

    Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security