New & Notable
Manage
Tips to find cyber insurance coverage in 2025
Most businesses have a form of cyber insurance, either through cyber liability and data breach endorsements in traditional business policies or through standalone cyber policies.
Manage
How to effectively respond to a ransomware attack
Does your organization know what to do if its systems are suddenly struck by a ransomware attack? To be ready, prepare your ransomware response well ahead of time.
Manage
How to ensure OT secure remote access and prevent attacks
OT systems face threats from attackers targeting their remote access capabilities. Segmenting networks is one important step. Learn other ways to safeguard your OT systems.
Get Started
Ransomware trends, statistics and facts in 2025
Supply chain attacks, double extortion and RaaS are some of the ransomware trends that will continue to disrupt businesses in 2025. Is your industry a top target?
Trending Topics
-
Data Security & Privacy Get Started
How to create a data breach response plan, with free template
A data breach response plan outlines how a business reacts to a breach. Follow these six steps, and use our free template to develop your organization's plan.
-
Threats & Vulnerabilities Manage
How to effectively respond to a ransomware attack
Does your organization know what to do if its systems are suddenly struck by a ransomware attack? To be ready, prepare your ransomware response well ahead of time.
-
IAM Problem Solve
How to create custom sudo configuration files in /etc/sudoers
Sudo offers administrators a lot of flexibility. Creating custom sudo configurations can go a long way toward easing management and service upgrade challenges.
-
Analytics & Automation News
Risk & Repeat: DeepSeek security issues emerge
The introduction of DeepSeek's new generative AI models has been met with fervor, but security issues have created apparent challenges for the Chinese startup.
-
Network Security Problem Solve
IPsec vs. SSL VPNs: What are the differences?
New technologies get all the headlines, but VPNs aren't going away anytime soon. Speed and security are among the factors to consider when determining what type of VPN to use.
-
Operations & Management News
RSA Conference 2025
Follow SearchSecurity's RSAC 2025 guide for insightful pre-conference insights and reports on notable presentations and breaking news at the world's biggest infosec event.
Sponsored Sites
-
Networking
Verizon Private 5G Edge - Enterprise Intelligence
Verizon is leading the development of secure cloud computing power at the edge of the network. Hosting applications at the network edge helps improve response times and performance – enabling the faster collection, processing and analysis of data for better business outcomes, and true Enterprise Intelligence.
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Artificial Intelligence
Intel & Red Hat: Leading the way in Enterprise AI
Combining Intel’s silicon experience with Red Hat’s software innovation to enable AI-driven hybrid multi-cloud solutions.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
Ransomware negotiation: Does it work, and should you try it?
Negotiating with the criminals who are holding your data for ransom is a daunting and stressful endeavor. Experts weigh in on the risks and the potential outcomes.
-
Ransomware payments: Considerations before paying
-
How to report ransomware attacks: Steps to take
-
Explaining AI's impact on ransomware attacks and security
-
-
Problem Solve
How to create custom sudo configuration files in /etc/sudoers
Sudo offers administrators a lot of flexibility. Creating custom sudo configurations can go a long way toward easing management and service upgrade challenges.
-
How to prevent and protect against ransomware
-
QR code phishing: 14 quishing prevention tips
-
IPsec vs. SSL VPNs: What are the differences?
-
-
Manage
Tips to find cyber insurance coverage in 2025
Most businesses have a form of cyber insurance, either through cyber liability and data breach endorsements in traditional business policies or through standalone cyber policies.
-
How to effectively respond to a ransomware attack
-
How to ensure OT secure remote access and prevent attacks
-
How to conduct ransomware awareness training for employees
-
Information Security Basics
-
Get Started
What is Pretty Good Privacy and how does it work?
Pretty Good Privacy, or PGP, was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files.
-
Get Started
Ransomware trends, statistics and facts in 2025
Supply chain attacks, double extortion and RaaS are some of the ransomware trends that will continue to disrupt businesses in 2025. Is your industry a top target?
-
Get Started
What is corporate governance?
Corporate governance is the combination of rules, processes and laws by which businesses are operated, regulated and controlled.
Multimedia
-
News
View All -
Organizations Lack Incident Response Plans, but Answers Are on the Way
Developing strong incident response plans remains an area that requires significant improvement. Here are some shortcomings and how to address them.
-
7 RSAC 2025 Cloud Security Sessions You Don't Want to Miss
Some of the brightest minds in the industry will discuss how to strengthen cloud security.
-
RSAC Unveils Keynote Speaker Slate for RSAC (TM) 2025 Conference
RSAC, the company behind the world's largest and most influential cybersecurity conference, today announced its current lineup of keynote speakers for its upcoming RSAC™ 2025 Conference, taking place at the Moscone Center in San Francisco from April...
Search Security Definitions
- What is Pretty Good Privacy and how does it work?
- What is cloud security?
- What is corporate governance?
- What is a side-channel attack?