SearchSecurity

New & Notable

News

APTs compromised defense contractor with Impacket tools

A CISA alert warned that APT actors compromised a defense contractor's Microsoft Exchange server and used Impacket, an open source Python toolkit, to move laterally in the network.

News

Ransomware attacks ravage schools, municipal governments

Attacks disclosed in September revealed that K-12 schools, universities and local governments continued to suffer at the hands of gangs such as Vice Society and BlackCat/Alphv.

Evaluate

Top zero-trust certifications, training for IT pros

Most organizations are expected to implement zero trust in the next few years. Learn about zero-trust certifications and trainings that can help prepare your security team.

News

Secureworks finds network intruders see little resistance

A report from Secureworks found that in many network intrusions, the attackers only need to employ basic, unsophisticated measures to evade detection.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident.

  • Get Started

    The 5 principles of zero-trust security

    Zero trust is a journey, not a destination. Ensure your corporate network is safe from internal and external threats by implementing these five principles of zero-trust security.

  • Get Started

    Why zero trust requires microsegmentation

    Microsegmentation is a key security technique that enables organizations to achieve a zero-trust model and helps ensure the security of workloads regardless of where they are located.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across SearchSecurity

SearchNetworking
SearchCIO
SearchEnterpriseDesktop
SearchCloudComputing
ComputerWeekly.com
Close