New & Notable

Evaluate

10 biggest data breaches in history, and how to prevent them

Did you know the biggest data breach in history exposed a whopping 3 billion user records? Don't make the same mistakes these companies did in the largest data breaches in history.

Manage

How to build an application security program

A well-defined application security program that includes multilayer software testing, SBOMs, and documentation and standards is vital to protect apps from threat actors.

Manage

Incident response for web application attacks

Web app security is like learning to ride a bike -- expect to struggle before getting it right. But don't be disheartened; learn from prior incidents to improve controls.

Get Started

What are the most common digital authentication methods?

How an organization authenticates users and devices is a hugely important piece in the cybersecurity puzzle. Get to know the various forms of digital authentication.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is a pass-the-hash attack?

    A pass-the-hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it to trick an authentication system into creating a new authenticated session on the same network.

  • Get Started

    What is a rootkit?

    A rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.

  • Get Started

    What is a copyright?

    Copyright is a legal term describing ownership or control of the rights to use and distribute certain works of creative expression, including books, video, motion pictures, musical compositions and computer programs.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security