Computer security, cybersecurity[1] or information technology security (IT security) is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

The field is becoming more important due to increased reliance on computer systems, the Internet[2] and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.[3]

More Info


New videos
Top Picks
Top Picks are automatically curated lists of the very best and most popular trending content relevant to a given Weave.
New videos
In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.
New videos
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.
New videos
Advanced persistent threat
An advanced persistent threat (APT) is a stealthy computer network attack in which a person or group gains unauthorized access to a network and remains undetected for an extended period.

People Recently Photographed at Cybersecurity Events41

Related Topics - Cybersecurity128

Related Topics - Business & Risk52

Prominent Cybersecurity Vendors146

Related Topics - Government & Public Policy56

Related Topics - Legal & Regulatory Issues34

Related Technology Companies & Services86

Related Topics - Information Science & Technology76

Common Vulnerabilities & Exploits123

Related Countries & Regions56

Related Topics - IT & Data Management33

Related Topics - Industries & Markets40

Related Topics - Telecommunications & Networks44

Related Topics - Operating Systems & Browsers30

Related Topics - Mobile & Smart Devices20

Thought Leaders in Cybersecurity204

Related Topics - Cloud Computing15

Related Topics - Finance & Banking59

Prominent Cyberattacks & Breaches25


Related Newspaper Coverage


Related Reports11