New & Notable

Evaluate

2025 identity security and data security predictions

From securing nonhuman identities to post-quantum cryptography to DSPM and DLP combining, here's what's in store for identity and data security in 2025.

News

Police bust cybercrime marketplace, phishing network

As part of Europol's announcement of the cybercriminal marketplace's disruption, the agency included an image of a takedown notice referencing the 'Manson Market.'

News

FBI: Criminals using AI to commit fraud 'on a larger scale'

As AI technology becomes more widely adopted, attackers are abusing it for their scams, which the FBI says are becoming increasingly more difficult to detect.

Problem Solve

How to protect against malware as a service

Malware operators are further monetizing their malicious software by selling it to other attackers on a subscription basis. Learn how to detect and mitigate the threat.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is obfuscation and how does it work?

    Obfuscation means to make something difficult to understand. Programming code is often obfuscated to protect intellectual property or trade secrets, and to prevent an attacker from reverse engineering a proprietary software program.

  • Get Started

    What is IPsec (Internet Protocol Security)?

    IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.

  • Get Started

    What is Extensible Authentication Protocol (EAP)?

    Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security