New & Notable

Evaluate

What the $32B Google-Wiz deal says about cloud-native security

Google's acquisition of Wiz for $32 billion highlights the importance of cloud-native security as organizations transition to microservices and containerization.

Manage

Benefits and challenges of zero standing privileges

Zero standing privileges combines the zero-trust model with the principle of least privilege to strengthen privileged access management and reduce enterprise attack surfaces.

Manage

Making a case for the cybersecurity data fabric

When it comes to data, context is everything. Learn how a cybersecurity data fabric can supercharge a security team's ability to see the big picture.

Manage

3 types of deepfake detection technology and how they work

Think you're talking to your boss on Zoom? You might want to think again. Deepfake technology has already cost enterprises millions of dollars. Here's how to fight fire with fire.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    WAF

    A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats.

  • Get Started

    buffer overflow

    A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.

  • Get Started

    What is elliptical curve cryptography (ECC)?

    Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security