New & Notable

News

National Public Data confirms breach, scope unknown

Reports suggest billions of personal records could have been compromised in the attack against data aggregator National Public Data, but the reality is more complicated.

Evaluate

How to select an MDR security service

With the threat landscape as challenging as it is, organizations are looking for reinforcements. One option is to bolster detection and response via third-party MDR services.

Get Started

The 5 different types of firewalls explained

The firewall remains a core fixture in network security. But, with five types of firewalls, three firewall deployment models and multiple placement options, things can get confusing.

News

GitHub Copilot Autofix tackles vulnerabilities with AI

GitHub says Copilot Autofix drastically reduced the median time to remediate vulnerabilities in beta testing from 90 minutes for manual fixes to 28 minutes with the GenAI tool.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    The 5 different types of firewalls explained

    The firewall remains a core fixture in network security. But, with five types of firewalls, three firewall deployment models and multiple placement options, things can get confusing.

  • Get Started

    12 types of endpoint security

    With the rise of remote work, mobile devices and IoT, the traditional security perimeter extends beyond corporate networks, making endpoint security crucial for organizations.

  • Get Started

    What is endpoint security? How does it work?

    Endpoint security is the protection of endpoint devices against cybersecurity threats.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close