New & Notable

Evaluate

9 identity and access management trends to watch in 2025

Identity threats continue to change and so, too, do the defenses developed to address those security challenges. Be ready for what's coming next in IAM.

Evaluate

7 must-know IAM standards in 2025

Does your IAM program need OAuth or OpenID Connect? Or maybe both? Let's look at the various standards and protocols that make identity management function.

Evaluate

Nonhuman identity security is getting board-level attention

Has your organization addressed nonhuman identity security? NHI attacks are becoming more prevalent and need to be a part of enterprise security strategies.

News

Aqua Security warns of significant risks in Prometheus stack

The cloud security vendor called on Prometheus to provide users with additional safeguards to protect against misconfigurations discovered in the open source monitoring tool.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is a block cipher?

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • Get Started

    What is a stream cipher?

    A stream cipher is an encryption method in which data is encrypted one byte at a time.

  • Get Started

    What is user authentication?

    User authentication refers to the process of verifying the identity of a user attempting to gain access to a computer network, system or device. This process runs in the background and can be done through different means, such as asking the user to ...

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security