Security | News, how-tos, features, reviews, and videos
MongoDB 6.0 introduces a preview feature that pulls off the quasi-magical feat of allowing encrypted data to be used as the target of searches, without ever transmitting the keys to the database.
Thanks to Stuxnet, we now live in a world where code can destroy machinery and stop (or start) a war.
Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a pernicious threat that continues to this day.
New research reveals what practitioners believe is most important for cloud security technology.
How successful companies are facing the challenges of securing emerging communication technologies.
New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform.
Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity going forward.
After the Okta breach, LAPSUS$ is already back making trouble using low-tech techniques with a high rate of success.
With flexibility comes confusion, misconfiguration, and exposure, researchers say.
Using a smartphone for two-factor authentication is easy, but it's not as secure as you might think. The real future for secure 2FA lies in the WebAuthn and Universal 2nd Factor standards.