New & Notable

6 reasons Cisco acquired Splunk

A treasure trove of Cisco and Splunk data, AI and analytics can improve cyber-resilience, accelerate threat detection and response, and enable more intelligent networks.


How to disable removable media access with Group Policy

Removable media can pose serious security problems. But there is a way to control who has access to optical disks and USB drives through Windows' Active Directory.


Apple issues emergency patches for 3 zero-day bugs

Apple said CVE-2023-41992, CVE-2023-41991 and CVE-2023-41993 -- all reported by Citizen Lab and Google researchers -- might have been exploited against versions of iOS before 16.7.


Google and Mandiant flex cybersecurity muscle at mWISE

End-to-end cybersecurity coverage and generative AI could accentuate Google and Mandiant's combined cybersecurity opportunities -- with the right execution.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    How to create a SOAR playbook in Microsoft Sentinel

    Using automation through tools such as SOAR and SIEM can improve incident response alert efficiency. One automated feature analysts can use is the SOAR playbook.

  • Get Started

    DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a Hypertext Transfer Protocol Secure encrypted session.

  • Get Started

    governance, risk and compliance (GRC)

    Governance, risk and compliance (GRC) refers to an organization's strategy for handling the interdependencies among the following three components: corporate governance policies, enterprise risk management programs, and regulatory and company ...

View All Get Started


Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Enterprise Desktop
Cloud Computing