Security Wire Weekly

Subscribe to Security Wire Weekly feed
Updated: 14 min 6 sec ago

A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.

Wed, 04/02/2025 - 4:49pm
A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.
Categories: Security Wire Weekly

A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

Wed, 04/02/2025 - 4:49pm
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.
Categories: Security Wire Weekly

Check out the latest security news from the Informa TechTarget team.

Wed, 04/02/2025 - 4:49pm
Check out the latest security news from the Informa TechTarget team.
Categories: Security Wire Weekly

IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.

Wed, 04/02/2025 - 4:49pm
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.
Categories: Security Wire Weekly

Implementing an effective REST API authentication strategy can help protect users and their data while maintaining a seamless data exchange across boundaries.

Wed, 04/02/2025 - 4:49pm
Implementing an effective REST API authentication strategy can help protect users and their data while maintaining a seamless data exchange across boundaries.
Categories: Security Wire Weekly

Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).

Wed, 04/02/2025 - 4:49pm
Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).
Categories: Security Wire Weekly

Threat modeling is the systematic process of identifying threats to and vulnerabilities in software applications, and then defining countermeasures to mitigate those threats and vulnerabilities to better protect business processes, networks, systems...

Wed, 04/02/2025 - 4:49pm
Threat modeling is the systematic process of identifying threats to and vulnerabilities in software applications, and then defining countermeasures to mitigate those threats and vulnerabilities to better protect business processes, networks, systems and data.
Categories: Security Wire Weekly

Malvertising is an up-and-coming cybersecurity threat, but marketing and IT teams alike can take several important steps to avoid and remove this threat.

Wed, 04/02/2025 - 4:49pm
Malvertising is an up-and-coming cybersecurity threat, but marketing and IT teams alike can take several important steps to avoid and remove this threat.
Categories: Security Wire Weekly

The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.

Wed, 04/02/2025 - 4:49pm
The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
Categories: Security Wire Weekly

Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.

Wed, 04/02/2025 - 4:49pm
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.
Categories: Security Wire Weekly

A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web.

Wed, 04/02/2025 - 4:49pm
A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web.
Categories: Security Wire Weekly

Companies are turning to passkeys as a secure login for consumers. Passkeys make it more difficult for thieves to steal information, and they are also more convenient for users.

Wed, 04/02/2025 - 4:49pm
Companies are turning to passkeys as a secure login for consumers. Passkeys make it more difficult for thieves to steal information, and they are also more convenient for users.
Categories: Security Wire Weekly

IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.

Wed, 04/02/2025 - 4:49pm
IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network.
Categories: Security Wire Weekly

Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints.

Wed, 04/02/2025 - 4:49pm
Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints.
Categories: Security Wire Weekly

One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help.

Wed, 04/02/2025 - 4:49pm
One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help.
Categories: Security Wire Weekly

Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them.

Wed, 04/02/2025 - 4:49pm
Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them.
Categories: Security Wire Weekly

Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or...

Wed, 04/02/2025 - 4:49pm
Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or alarm) system.
Categories: Security Wire Weekly

Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust.

Wed, 04/02/2025 - 4:49pm
Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust.
Categories: Security Wire Weekly

Tabletop games and live-fire exercises are two ways to test the effectiveness of enterprise security controls and defenses. Discover how each works and how they differ.

Wed, 04/02/2025 - 4:49pm
Tabletop games and live-fire exercises are two ways to test the effectiveness of enterprise security controls and defenses. Discover how each works and how they differ.
Categories: Security Wire Weekly

You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools.

Wed, 04/02/2025 - 4:49pm
You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools.
Categories: Security Wire Weekly

Pages