From macro viruses to droppers and packers, here’s a look at nine common virus types, what they do, and the function they perform for attackers.
Stories by Josh Fruhlinger
A logic bomb is malicous code that waits for the right time or the right opportunity to strike. Some infamous examples show the potential for damage.
Penetration testing is a process in which a security professional simulates an attack on a network or computer system to evaluate its security.
Certifications can be a real boon to your career or those of your staff -- unless you fall prey to these common pitfalls.
Cloud security skills are in high demand. These certs will help you demonstrate your cloud security know-how.
Even savvy dark web denizens sometimes fail to cover their tracks.
OSINT is the practice of collecting information from published or otherwise publicly available sources.
HITRUST aims to help users get ready for compliance with a wide variety of security rule sets at once. It's not cheap, but it could save time and effort.
SOAR platforms coordinate information produced by a wide range of security tools and automate much of their analysis and protective responses.
Who the CISO reports to may say more about an organisation's maturity than it does about an individual's effectiveness.
You’ll need the right attitude and the right hard and soft skills to feel like a winner in your software development career.
Cryptography is the science of keeping information secret and safe by transforming it into form that unintended recipients cannot understand.
Identity theft is the use of someone else's personal information without permission, typically to conduct financial transactions.
GitOps applies the same techniques to deploying infrastructure as devops and CI/CD use to deploy applications.
Data loss prevention is a set of practices (and products) that ensure that an organisation's sensitive or critical data is kept safe.
Vivek Puthucode, Chief Partner Officer, Microsoft Asia Pacific, outlines the path to partner success.