New & Notable

Manage

How to create a strong passphrase, with examples

Passphrases have emerged as an effective way to protect networks from brute-force attacks. But users still need to know how to create a passphrase that's effective.

Evaluate

What the $32B Google-Wiz deal says about cloud-native security

Google's acquisition of Wiz for $32 billion highlights the importance of cloud-native security as organizations transition to microservices and containerization.

Manage

Benefits and challenges of zero standing privileges

Zero standing privileges combines the zero-trust model with the principle of least privilege to strengthen privileged access management and reduce enterprise attack surfaces.

Manage

Making a case for the cybersecurity data fabric

When it comes to data, context is everything. Learn how a cybersecurity data fabric can supercharge a security team's ability to see the big picture.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    WAF

    A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats.

  • Get Started

    buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.

  • Get Started

    What is elliptical curve cryptography (ECC)?

    Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security