New & Notable

News

Akira ransomware gang targeting SonicWall VPN accounts

Arctic Wolf recently observed the Akira ransomware gang compromising SonicWall SSL VPN accounts, which could be connected to a critical vulnerability in SonicOS.

Evaluate

Cyber-risk management remains challenging

Strong cyber-risk management demands collaboration and coordination across business management, IT operations, security and software development in an ever-changing environment.

Manage

How to create an AI acceptable use policy, plus template

With great power comes -- in the case of generative AI -- great security and compliance risks. Learn how an AI acceptable use policy can help ensure safe use of the technology.

Problem Solve

Top API risks and how to mitigate them

While APIs play an essential role in most modern business strategies, they can also introduce serious security threats. Learn some of the top API risks and how to mitigate them.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    What is identity threat detection and response (ITDR)?

    Identity threat detection and response (ITDR) is a collection of tools and best practices aimed at defending against cyberattacks that specifically target user identities or identity and access management (IAM) infrastructure.

  • Get Started

    What is MXDR, and do you need it?

    Managed extended detection and response (MXDR) is an outsourced service that collects and analyzes threat data from across an organization's IT environment.

  • Get Started

    What is threat hunting? Key strategies explained

    If you are ready to take a more proactive approach to cybersecurity, threat hunting might be a tactic to consider. Here's what security teams should know.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close