New & Notable

Evaluate

Entrust sells certificate business: Implications and actions

Entrust selling its certificate business to Sectigo isn't the only change that enterprises will face when it comes to the future of digital certificates.

News

Salt Typhoon compromises telecom providers' Cisco devices

Salt Typhoon's latest campaign exploits older vulnerabilities in Cisco edge devices to gain access to the networks of several telecom companies, including two based in the U.S.

News

Fortinet discloses second authentication bypass vulnerability

Fortinet disclosed CVE-2025-24472 in an updated advisory that confused some in the infosec community because it stated that 'reports show this is being exploited in the wild.'

Evaluate

Benefits and challenges of passkeys in the enterprise

Passkeys overcome some of the critical security vulnerabilities plaguing passwords. But enterprises face some new challenges when deploying the authentication technology.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is defense in depth?

    Defense in depth is a cybersecurity strategy that uses multiple security measures to protect an organization's networks, systems and data.

  • Get Started

    What are social engineering attacks?

    Social engineering is an attack vector that relies heavily on human interaction and often involves psychological manipulation of people into breaking normal security procedures and best practices to gain unauthorized access.

  • Get Started

    What is a botnet?

    A botnet is a collection of internet-connected devices -- including PCs, servers, mobile devices and internet of things (IoT) devices -- infected and controlled by a common type of malware, often unbeknownst to their owners.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security