New & Notable

Get Started

Incident response: How to implement a communication plan

Communication is critical to an effective incident response plan. Here are five best practices for communication planning and a free, editable template to get started.

News

Ivanti confirms 2 zero-day vulnerabilities are under attack

Volexity reported the vulnerabilities to Ivanti after discovering that suspected Chinese nation-state threat actors created an exploit chain to achieve remote code execution.

Manage

Cloud incident response: Frameworks and best practices

Cloud incident response, like it sounds, involves responding to incidents in the cloud. But there are nuances to be aware of and unique best practices to follow.

News

China claims it cracked Apple's AirDrop, can track senders

The flaw used by Chinese researchers to crack Apple's AirDrop encryption was reported to the company in 2019 by researchers at German university TU Darmstadt.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    Incident response: How to implement a communication plan

    Communication is critical to an effective incident response plan. Here are five best practices for communication planning and a free, editable template to get started.

  • Get Started

    extended detection and response (XDR)

    Extended detection and response (XDR) is a technology-driven cybersecurity process designed to help organizations detect and remediate security threats across their entire IT environment.

  • Get Started

    vulnerability management

    Vulnerability management is the process of identifying, assessing, remediating and mitigating security vulnerabilities in software and computer systems.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close