New & Notable

News

Top.gg supply chain attack highlights subtle risks

Threat actors used fake Python infrastructure and cookie-stealing to poison multiple GitHub code repositories, putting another spotlight on supply chain risks.

Evaluate

Top 6 data security posture management use cases

Data security posture management is a top 10 security issue for 2024, according to research. Check out the top six use cases for DSPM and weigh in on other possibilities.

Problem Solve

How to prevent cloud account hijacking attacks

The ability to identify the various methods of cloud account hijacking is key to prevention. Explore three ways to limit potential consequences of cloud credential compromise.

Evaluate

Agent vs. agentless security: Learn the differences

Enterprises can either use an agent or agentless approach to monitor and secure their networks. Each approach has benefits and drawbacks.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    How to perform a data protection impact assessment

    Conducting a data protection impact assessment is key to evaluating potential risk factors that could pose a serious threat to individuals and their personal information.

  • Get Started

    Fuzzy about fuzz testing? This fuzzing tutorial will help

    Organizations are searching for ways to automate and improve their application security processes. Fuzz testing is one way to fill in some of the gaps.

  • Get Started

    virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an infected system and it often propagates to other systems, much like a biological virus spreads from host to host.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close