New & Notable

Manage

Attack surface reduction rules for Microsoft productivity apps

Attack surface reduction rules in Microsoft Defender for Endpoint help prevent apps from launching executable files and scripts, running suspicious scripts and more.

Manage

Manage security posture with Microsoft Defender for Endpoint

Organizations need to implement security posture management to ensure their cybersecurity strategy can address malicious actions inside and out.

News

Zyxel vulnerability under 'widespread exploitation'

Researchers warn that threat actors are widely exploiting an unauthenticated command injection vulnerability to target multiple Zyxel network devices.

News

Zero-day vulnerability in MoveIt Transfer under attack

Rapid7 observed exploitation of a SQL injection vulnerability in Progress Software's managed file transfer product, which was disclosed this week but has not been patched.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close