New & Notable

News

Cloudflare unveils tools for safeguarding AI deployment

The cybersecurity vendor's new suite helps businesses, developers and content creators deploy AI technology at scale safely and securely.

Manage

How to calculate the cost of a data breach

An effective risk management policy can help companies determine the best ways to offset the costs associated with a data breach and avoid reputational damage.

Problem Solve

How to avoid and prevent social engineering attacks

Organizations and employees must both do their part to prevent and avoid social engineering attacks. A combination of security controls, policies, procedures and training is necessary.

Manage

How to secure AI infrastructure: Best practices

AI tools are creating an even greater attack surface for malicious hackers to penetrate. But there are steps you can take to ensure your organization's AI foundation remains safe.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.

  • Get Started

    What is elliptical curve cryptography (ECC)?

    Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.

  • Get Started

    What is pharming?

    Pharming is a scamming practice in which malicious code is installed on a PC or server, misdirecting users to fraudulent websites without their knowledge or consent.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security