Researchers have created a tool that uses Git repositories to demonstrate how Agile and other software development approaches could have security issues.
Today IBM X-Force Red launches a collaboration with the Watson IoT Platform to help ensure that all IoT solutions get our special brand of hacker love.
The Black Hat conference offers a chance to network and glean insights from experts that can change the way you think about security.
Security experts expect U.S. infrastructure to suffer a major cyberattack in the next two years, according a survey of recent Black Hat attendees.
These 2017 cybersecurity conferences offer educational and networking opportunities for security experts, professionals, enthusiasts and even hackers.
Information sharing is key to the success of the cybersecurity industry. Learn more about ethical hacking and bug bounty programs at Black Hat Europe 2016.
Cybersecurity conferences can be expensive and require months of planning and lots of travel, but the security education benefits far outweigh the costs.
Security leaders, professionals and operational business leaders all stand to benefit from the myriad security conferences being held in 2017.
Cybercriminals developed HEIST, or "HTTP Encrypted Information can be Stolen Through TCP-Windows," to steal data using a cryptographic scheme.
The official 2016 Black Hat app contained a number of serious social flaws, which organizers disabled before the app went live.