New & Notable

Evaluate

Black Hat USA 2024 takeaways for data security and IAM

Black Hat USA 2024 showcased recurring themes of data security and IAM, encompassing the platform vs. point product debate, cleaning identity data and GenAI security.

News

Law enforcement disrupts Radar/Dispossessor ransomware group

The now-disrupted Radar/Dispossessor ransomware gang was launched in August 2023, and its members have targeted dozens of SMBs across critical sectors via dual extortion.

Evaluate

SIEM vs. SOAR vs. XDR: Evaluate the key differences

SIEM, SOAR and XDR each possess distinct capabilities and drawbacks. Learn the differences among the three, how they can work together and which your company needs.

News

Risk & Repeat: Recapping Black Hat USA 2024

Highlights from Black Hat USA 2024 include a keynote panel on securing election infrastructure as well as several sessions on potential threats against new AI technology.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    12 types of endpoint security

    With the rise of remote work, mobile devices and IoT, the traditional security perimeter extends beyond corporate networks, making endpoint security crucial for organizations.

  • Get Started

    What is endpoint security? How does it work?

    Endpoint security is the protection of endpoint devices against cybersecurity threats.

  • Get Started

    What is cyber attribution?

    Cyber attribution is the process of tracking and identifying the perpetrator of a cyberattack or other cyber operation.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close