New & Notable

News

CrowdStrike extends cloud security to Mission Cloud customers

CrowdStrike Falcon Cloud Security and Falcon Complete Cloud Detection and Response (CDR) will be made available through the Mission Cloud One AWS MSP platform.

Evaluate

Optimize encryption and key management in 2024

Enterprise Strategy Group research highlighted the encryption challenges enterprises face, including lack of encryption, cryptographic infrastructure inadequacies and more.

Get Started

Stateful vs. stateless firewalls: Understanding the differences

Stateful firewalls are the norm in most networks, but there are still times where a stateless firewall fits the bill. Learn how these firewalls work and what approach might be best.

News

Mandiant upgrades Sandworm to APT44 due to increasing threat

Over the past decade, Sandworm has been responsible for high-severity attacks that highlight the group's persistence, evasion techniques and threat to government bodies.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    ID management

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to technology resources.

  • Get Started

    single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications.

  • Get Started

    cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems to understand how they work and to find and improve techniques for defeating or weakening them.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close