New & Notable

News

Splunk details Sqrrl 'screw-ups' that hampered threat hunting

At RSA Conference 2024, Splunk's David Bianco emphasizes that enterprises need revamped threat hunting frameworks to help with threat detection and response challenges.

News

IBM study shows security for GenAI projects is an afterthought

IBM's survey of C-suite executives finds that 82% say trustworthy and secure AI are essential, but only 24% have a security component included in their GenAI projects.

News

Cisco details Splunk security integrations, AI developments

Just two months after Cisco completed its $28 billion acquisition of analytics giant Splunk, the company added XDR capabilities into Splunk Enterprise Security.

Evaluate

AWS to protect its cloud using CrowdStrike security products

AWS is replacing a variety of security products with the CrowdStrike Falcon Platform to further secure applications and data on its cloud.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    SIEM

    Security information and event management (SIEM) is an approach to security management that combines security information management (SIM) and security event management (SEM) functions into one security management system.

  • Get Started

    What is role-based access control (RBAC)?

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.

  • Get Started

    What is PCI DSS (Payment Card Industry Data Security Standard)?

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal ...

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Security

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close