New & Notable

Evaluate

Key cybersecurity takeaways from AWS re:Invent

Security was strongly emphasized throughout the AWS re:Invent user conference, with product updates to help companies secure data as they build apps and scale in the cloud.

Evaluate

Assess security posture with the Cloud Security Maturity Model

The Cloud Security Maturity Model enables organizations to assess their cloud security posture and optimize it as they continue their cloud journey.

Evaluate

How organizations can learn from cloud security breaches

Research shed light on cloud security breaches. It's time to learn from the past and mitigate these attacks in the future with strong cloud security and posture management.

Evaluate

Amazon IAM announcements at re:Invent 2023

At AWS re:Invent 2023, Amazon announced several new features around machine and human identities designed to improve identity and access management.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    APT

    An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period.

  • Get Started

    Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyber adversaries to help organizations strengthen their cybersecurity strategies.

  • Get Started

    timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about or access a system.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close