New & Notable
News
National Public Data confirms breach, scope unknown
Reports suggest billions of personal records could have been compromised in the attack against data aggregator National Public Data, but the reality is more complicated.
Evaluate
How to select an MDR security service
With the threat landscape as challenging as it is, organizations are looking for reinforcements. One option is to bolster detection and response via third-party MDR services.
Get Started
The 5 different types of firewalls explained
The firewall remains a core fixture in network security. But, with five types of firewalls, three firewall deployment models and multiple placement options, things can get confusing.
News
GitHub Copilot Autofix tackles vulnerabilities with AI
GitHub says Copilot Autofix drastically reduced the median time to remediate vulnerabilities in beta testing from 90 minutes for manual fixes to 28 minutes with the GenAI tool.
Trending Topics
- 
Data Security & Privacy NewsJuly ransomware attacks slam public sector organizationsThe global IT outage caused by an errant CrowdStrike channel file update dominated security news last month. But there were still plenty of ransomware attacks to go around. 
- 
Threats & Vulnerabilities NewsRisk & Repeat: Recapping Black Hat USA 2024Highlights from Black Hat USA 2024 include a keynote panel on securing election infrastructure as well as several sessions on potential threats against new AI technology. 
- 
IAM EvaluateBlack Hat USA 2024 takeaways for data security and IAMBlack Hat USA 2024 showcased recurring themes of data security and IAM, encompassing the platform vs. point product debate, cleaning identity data and GenAI security. 
- 
Analytics & Automation NewsGitHub Copilot Autofix tackles vulnerabilities with AIGitHub says Copilot Autofix drastically reduced the median time to remediate vulnerabilities in beta testing from 90 minutes for manual fixes to 28 minutes with the GenAI tool. 
- 
Network Security Get StartedThe 5 different types of firewalls explainedThe firewall remains a core fixture in network security. But, with five types of firewalls, three firewall deployment models and multiple placement options, things can get confusing. 
- 
Operations & Management NewsLaw enforcement disrupts Radar/Dispossessor ransomware groupThe now-disrupted Radar/Dispossessor ransomware gang was launched in August 2023, and its members have targeted dozens of SMBs across critical sectors via dual extortion. 
Topics Covered
- Application and platform security
- Careers and certifications
- Cloud security
- Compliance
- Data security and privacy
- Identity and access management
- Network security
- Risk management
- Security analytics and automation
- Security operations and management
- Threat detection and response
- Threats and vulnerabilities
Find Solutions For Your Project
- 
EvaluateHow to select an MDR security serviceWith the threat landscape as challenging as it is, organizations are looking for reinforcements. One option is to bolster detection and response via third-party MDR services. - 
Black Hat USA 2024 takeaways for data security and IAM
- 
SIEM vs. SOAR vs. XDR: Evaluate the key differences
- 
EDR testing: How to validate EDR tools
 
- 
- 
Problem SolveHow to protect against cloud DDoS attacksCloud DDoS protection enables companies to detect and mitigate DDoS attacks before they cause significant downtime, infrastructure issues and potential business losses. - 
6 types of DNS attacks and how to prevent them
- 
How to use PuTTY for SSH key-based authentication
- 
How to protect port 139 from SMB attacks
 
- 
- 
ManageHow blockchain can support third-party risk managementThird-party risk is of significant and growing concern to today's businesses. Explore how blockchain technology could transform third-party risk management for the better. - 
EDR vs. SIEM: What's the difference?
- 
How to implement an attack surface management program
- 
Where to place a firewall in an enterprise network
 
- 
- 
E-Handbook | July 2021Mitigating risk-based vulnerability management challengesDownload
- 
E-Handbook | June 2021Security observability tools step up threat detection, responseDownload
- 
E-Handbook | January 2021SolarWinds supply chain attack explained: Need-to-know infoDownload
- 
E-Handbook | November 2020Cyber insurance 101: Timely guidance on an essential toolDownload
- 
E-Zine | November 2020AI cybersecurity raises analytics' accuracy, usabilityDownload
Information Security Basics
- 
Get StartedThe 5 different types of firewalls explainedThe firewall remains a core fixture in network security. But, with five types of firewalls, three firewall deployment models and multiple placement options, things can get confusing. 
- 
Get Started12 types of endpoint securityWith the rise of remote work, mobile devices and IoT, the traditional security perimeter extends beyond corporate networks, making endpoint security crucial for organizations. 
- 
Get StartedWhat is endpoint security? How does it work?Endpoint security is the protection of endpoint devices against cybersecurity threats. 
Multimedia
- 
NewsView All
- 
Data security and privacyJuly ransomware attacks slam public sector organizationsThe global IT outage caused by an errant CrowdStrike channel file update dominated security news last month. But there were still plenty of ransomware attacks to go around. 
- 
Data security and privacyNational Public Data confirms breach, scope unknownReports suggest billions of personal records could have been compromised in the attack against data aggregator National Public Data, but the reality is more complicated. 
- 
Security analytics and automationGitHub Copilot Autofix tackles vulnerabilities with AIGitHub says Copilot Autofix drastically reduced the median time to remediate vulnerabilities in beta testing from 90 minutes for manual fixes to 28 minutes with the GenAI tool. 
Security Definitions
- What is endpoint security? How does it work?
- What is cyber attribution?
- What is SSH (Secure Shell) and How Does It Work?
- What is a computer exploit?
- What is malware? Prevention, detection and how attacks work
- What is exposure management?
- What is an intrusion detection system (IDS)?
- What is a cyber attack? How they work and how to stop them










