Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
What is phishing? Understanding enterprise phishing threats
Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person to trick users into revealing sensitive information. Continue Reading
SBOM formats explained: Guide for enterprises
SBOMs inventory software components to help enhance security by tracking vulnerabilities. Teams have three standard SBOM formats to choose from: CycloneDX, SPDX and SWID tags. Continue Reading
What is a virtual CISO (vCISO)? Does your business need one?
The virtual chief information security officer (vCISO) is a C-suite-level security professional or service provider who offers CISO-level expertise on a part-time, remote or contractual basis. Continue Reading
-
How to build a cybersecurity RFP
Crafting a cybersecurity RFP requires clear goals, precise questions and vendor vetting. Follow these guidelines to streamline the process and meet your company's security needs. Continue Reading
Cybersecurity budget justification: A guide for CISOs
The best way to get a security budget request denied? Present it like a jargon-filled shopping list. Instead, make the case by tying security spending to business outcomes. Continue Reading
-
Definitions to Get Started
- What is phishing? Understanding enterprise phishing threats
- What is a virtual CISO (vCISO)? Does your business need one?
- What is a virtual CISO (vCISO)? Does your business need one?
- What is single sign-on (SSO)?
- What is risk avoidance?
- What is pure risk?
- What is residual risk? How is it different from inherent risk?
- What is a SYN flood DoS attack?
What is a virtual CISO (vCISO)? Does your business need one?
The virtual chief information security officer is a C-suite-level security professional or service provider who offers CISO-level expertise on a part-time, remote or contractual basis.Continue Reading
What is single sign-on (SSO)?
Single sign-on (SSO) is a session and user authentication service that lets users access multiple applications or systems with a single set of login credentials.Continue Reading
Cybersecurity governance: A guide for businesses to follow
Cybersecurity governance is now critical, with NIST CSF 2.0 recently adding it as a dedicated function. Learn why governance is core to an effective cyber strategy.Continue Reading
What is risk avoidance?
Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.Continue Reading
What is pure risk?
Pure risk refers to risks that are beyond human control and result in a loss or no loss, with no possibility of financial gain.Continue Reading
-
What is residual risk? How is it different from inherent risk?
Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made.Continue Reading
What is a SYN flood DoS attack?
A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. This exploit is also known as a 'half-open attack.'Continue Reading
What is a cyberattack? 16 common types and how to prevent them
To stop cybercrime, companies must understand how they're being attacked. Here are the most damaging types of cyberattacks, how to prevent them and their effect on daily business.Continue Reading
What executives must know about nation-state threat actors
Nation-state threat actors like Russia, China, Iran and North Korea are targeting critical infrastructure and sensitive data, so executives must prepare to defend against them.Continue Reading
What is risk assessment?
Risk assessment is the process of identifying hazards that could negatively affect an organization's ability to conduct business.Continue Reading
What is an advanced persistent threat (APT)?
An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.Continue Reading
How to create an SBOM: Example and free template
SBOMs provide an inventory of every component in an organization's software supply chain. Use this free downloadable SBOM template to create one for your organization.Continue Reading
5 essential programming languages for cybersecurity pros
Coding is an important skill across almost every technology discipline, and cybersecurity is no exception. Learn about the top programming languages for security professionals.Continue Reading
Hydra password-cracking tool: How to download and use it for good
Ethical hackers, need help brute forcing passwords? Learn how to download and use the open source Hydra password-cracking tool with this step-by-step tutorial and companion video.Continue Reading
What is HMAC (Hash-Based Message Authentication Code)?
Hash-based message authentication code (HMAC) is a message encryption method that uses a cryptographic key with a hash function.Continue Reading
What is operational risk?
Operational risk is the risk of losses caused by flawed or failed processes, policies, systems, people or events that disrupt business operations.Continue Reading
What is cyber risk quantification (CRQ)? How to get it right
Cyber risk quantification translates security threats into financial terms, so executives can prioritize risks, justify investments and allocate resources to protect the business.Continue Reading
Cybersecurity risk management: Best practices and frameworks
This proactive approach protects business operations, ensures compliance and preserves reputation through comprehensive security practices.Continue Reading
Enumeration attacks: What they are and how to prevent them
User and network enumeration attacks help adversaries plan strong attack campaigns. Prevent them with MFA, rate limiting, CAPTCHA, secure code and more.Continue Reading
12 common types of malware attacks and how to prevent them
More than one billion active malware programs exist worldwide. Is your organization prepared to prevent these 12 types of malware attacks?Continue Reading
AI-powered attacks: What CISOs need to know now
AI-powered attacks are transforming cybersecurity, using AI to automate and personalize threats at an unprecedented scale since 2022.Continue Reading
Symmetric vs. asymmetric encryption: Understand key differences
Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons.Continue Reading
Why identity is the new perimeter – and how to defend it
Identity has replaced network boundaries as today's security perimeter. Organizations must focus on protecting digital identities to safeguard their assets.Continue Reading
What is cyber extortion?
Cyber extortion is a crime involving an attack or threat of an attack, coupled with a demand for money or some other response, in return for stopping an attack or preventing one from happening.Continue Reading
What is the WannaCry ransomware attack?
WannaCry ransomware is a cyberattack that spread by exploiting vulnerabilities in earlier and unpatched versions of the Windows operating system (OS).Continue Reading
What is a chief risk officer (CRO)? A detailed CRO job description
The chief risk officer (CRO) is a senior executive tasked with assessing, overseeing and mitigating an organization's risks.Continue Reading
What is a next-generation firewall (NGFW)?
A next-generation firewall (NGFW) is a network security device that combines traditional firewall capabilities with advanced features to detect and block sophisticated cyberattacks.Continue Reading
What is a time-based one-time password?
A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors.Continue Reading
What is security?
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets.Continue Reading
What is triple extortion ransomware?
Triple extortion ransomware is a type of ransomware attack in which a cybercriminal extorts their victim multiple times -- namely by encrypting data, exposing exfiltrated data and then threatening an additional third attack vector.Continue Reading
What is double extortion ransomware? How to defend your organization
Double extortion ransomware is a type of cyberattack that encrypts a victim's data, like in a traditional ransomware attack, while also adding a second attack vector of stealing that data.Continue Reading
How to create a remote access policy, with template
Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy.Continue Reading
What is data risk management? Key risks and best practices
Data risk management identifies, assesses and mitigates threats to organizational data, safeguarding sensitive information from unauthorized access.Continue Reading
What is data security posture management (DSPM)?
Data security posture management, or DSPM, is an approach that combines technologies and processes to provide a holistic view of a company's sensitive data, including where the data is, who has access to it, how it has been used and its security ...Continue Reading
What is a firewall and why do I need one?
A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules.Continue Reading
What is risk appetite?
Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.Continue Reading
What is penetration testing?
A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture.Continue Reading
What is a security operations center (SOC)?
A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks.Continue Reading
What is a risk profile? Definition, examples and types
A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.Continue Reading
What is risk reporting?
Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.Continue Reading
15 of the biggest ransomware attacks in history
From attacks on private organizations and manufacturers to healthcare organizations and even entire countries, ransomware has done extensive damage in recent years.Continue Reading
7 stages of the ransomware lifecycle
It can be nearly impossible to predict if or how a ransomware group will target an organization, but there are knowable stages of a ransomware attack.Continue Reading
What is a risk map (risk heat map)?
A risk map, or risk heat map, is a data visualization tool for communicating specific risks an organization faces.Continue Reading
What is risk exposure in business?
Risk exposure is the quantified potential loss from currently underway or planned business activities.Continue Reading
What is crypto ransomware? How cryptocurrency aids attackers
Crypto ransomware is a form of ransomware that uses cryptography to encrypt computer files so that the victim cannot access them. In exchange for the demanded ransom, the attacker claims it will tell the victimized business how to regain access to ...Continue Reading
What is a brute-force attack?
A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems.Continue Reading
The history and evolution of ransomware attacks
Ransomware creators have become more innovative and savvier as organizations up their defenses.Continue Reading
What is Pretty Good Privacy and how does it work?
Pretty Good Privacy, or PGP, was a popular program used to encrypt and decrypt email over the internet, as well as authenticate messages with digital signatures and encrypted stored files.Continue Reading
Ransomware trends, statistics and facts in 2025
Supply chain attacks, double extortion and RaaS are some of the ransomware trends that will continue to disrupt businesses in 2025. Is your industry a top target?Continue Reading
What is cloud security?
Cloud security, or cloud computing security, is a set of policies, practices and controls deployed to protect cloud-based data, applications and infrastructure from cyberattacks and cyberthreats.Continue Reading
What is corporate governance?
Corporate governance is the combination of rules, processes and laws by which businesses are operated, regulated and controlled.Continue Reading
8 types of ransomware, plus examples of attacks
There are eight main types of ransomware but hundreds of examples of ransomware strains. Learn how the ransomware types work and review notable attacks and variants.Continue Reading
How to create a data breach response plan, with free template
A data breach response plan outlines how a business reacts to a breach. Follow these six steps, and use our free template to develop your organization's plan.Continue Reading
How to report ransomware attacks: Steps to take
The Cybersecurity and Infrastructure Security Agency and FBI recommend reporting ransomware attacks to the authorities as soon as possible.Continue Reading
What is a hacker?
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.Continue Reading
What is a web application firewall (WAF)? WAF explained
A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats.Continue Reading
What is a buffer overflow? How do these types of attacks work?
A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.Continue Reading
What is elliptical curve cryptography (ECC)?
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.Continue Reading
What is pharming?
Pharming is a scamming practice in which malicious code is installed on a PC or server, misdirecting users to fraudulent websites without their knowledge or consent.Continue Reading
What is a pass-the-hash attack?
A pass-the-hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.Continue Reading
What is a rootkit?
A rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.Continue Reading
What is a copyright?
Copyright is a legal term describing ownership or control of the rights to use and distribute certain works of creative expression, including books, video, motion pictures, musical compositions and computer programs.Continue Reading
What is Kerberos and how does it work?
Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet.Continue Reading
What are the most common digital authentication methods?
How an organization authenticates users and devices is a hugely important piece in the cybersecurity puzzle. Get to know the various forms of digital authentication.Continue Reading
SEC cybersecurity disclosure rules, with checklist
Public companies must regularly share information about their cybersecurity practices and disclose details of material cyberincidents. Learn how to comply.Continue Reading
What is a certificate authority (CA)?
A certificate authority (CA) is a trusted entity that issues digital certificates to authenticate content sent from web servers.Continue Reading
What is promiscuous mode in networking?
In computer networking, promiscuous mode is a mode of operation in which a network device, such as a network interface card (NIC) or an adapter on a host system, can intercept and read in its entirety each network packet that arrives instead of just...Continue Reading
How to create a data security policy, with template
When it comes to data security, the devil is in the details. One critical detail organizations shouldn't overlook is a succinct yet detailed data security policy.Continue Reading
What is the Twofish encryption algorithm?
Twofish is a symmetric-key block cipher with a block size of 128 bits and variable-length key of size 128, 192 or 256 bits.Continue Reading
Using shred and dd commands in Linux to securely wipe data
When it's time to get rid of old systems or when moving one system from one location to another, it's a good idea to use Linux utilities to securely delete existing data.Continue Reading
Types of DNS servers and how they work, plus security threats
DNS security is a critical component of system administration. Learn about five types of DNS servers, what each does and the security threats each server faces.Continue Reading
What is cyberstalking and how to prevent it?
Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum.Continue Reading
What is a watering hole attack?
A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.Continue Reading
What is the NSA and how does it work?
The National Security Agency (NSA) is a federal government surveillance and intelligence agency that's part of the U.S. Department of Defense and is managed under the authority of the director of national intelligence (DNI).Continue Reading
What is multifactor authentication?
Multifactor authentication (MFA) is an IT security technology that requires multiple sources of unique information from independent categories of credentials to verify a user's identity for a login or other transaction.Continue Reading
What is a DMZ in networking?
In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet. DMZs are also known as perimeter networks or screened ...Continue Reading
What is domain generation algorithm (DGA)?
A domain generation algorithm (DGA) is a program that generates a large list of domain names. DGAs provide malware with new domains to evade security countermeasures.Continue Reading
What is federated identity management (FIM)? How does it work?
Federated identity management (FIM) is an arrangement between multiple enterprises or domains that enables their users to use the same identification data (digital identity) to access all their networks.Continue Reading
WAF vs. RASP for web app security: What's the difference?
Web application firewalls use a negative security model, while runtime application self-protection tools use a positive security model. Which is better at keeping apps secure?Continue Reading
What is application allowlisting?
Application allowlisting, previously known as 'application whitelisting,' is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system.Continue Reading
Penetration testing vs. vulnerability scanning: What's the difference?
Confused by the distinctions between penetration testing and vulnerability scanning? You're not alone. Learn the key differences between the two and when to use each.Continue Reading
What is a checksum?
A checksum is a value that represents the number of bits in a transmission message. IT professionals use it to detect high-level errors within data transmissions.Continue Reading
What is TLS (Transport Layer Security)? Definition & Uses
Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications.Continue Reading
What is an attack vector?
An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server to deliver a payload or malicious outcome.Continue Reading
What is email spoofing?
Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source.Continue Reading
What is challenge-response authentication?
In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs and activities.Continue Reading
What is defense in depth?
Defense in depth is a cybersecurity strategy that uses multiple security measures to protect an organization's networks, systems and data.Continue Reading
What are social engineering attacks?
Social engineering is an attack vector that relies heavily on human interaction and often involves psychological manipulation of people into breaking normal security procedures and best practices to gain unauthorized access.Continue Reading
What is a botnet?
A botnet is a collection of internet-connected devices -- including PCs, servers, mobile devices and internet of things (IoT) devices -- infected and controlled by a common type of malware, often unbeknownst to their owners.Continue Reading
What is a denial-of-service attack?
A denial-of-service (DoS) attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer systems, networks, services or other IT resources.Continue Reading
What is cyber hijacking?
Cyber hijacking, or computer hijacking, is a type of network security attack in which the threat actor takes control of computer systems, software programs and network communications.Continue Reading
What is antimalware?
Antimalware is a software program created to protect IT systems and individual computers from malicious software, or malware.Continue Reading
What is Blowfish?
Blowfish is a variable-length, symmetric, 64-bit block cipher.Continue Reading
What is a honeypot? How it protects against cyberattacks
A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to help organizations detect, deflect and study hacking attempts to gain unauthorized access to IT.Continue Reading
How to use pfSense: Use cases and initial configurations
Open source firewall and routing software pfSense offers a compelling mix of capabilities that can work for organizations large and small.Continue Reading