Black and white hat hackers may be the most well-known types, but a third kind of hacking focuses on solving math problems to help develop the cyberdomain.
Check out the many 2015 conferences that will be held around the world this year for security professionals looking to learn more about the industry.
From IBM InterConnect to Black Hat USA, there are many security conferences going on this year that will help professionals network and boost their skills.
The only way to really test your organization's cybersecurity measures is to attack them — which means learning to think like a black-hat hacker.
Recap of Bruce Schneier's Black Hat keynote, "The State of Incident Response," covering trends in the cyberworld and how threats should be addressed.
Privacy is a significant concern in the Internet of Things. It is already changing the security landscape and exponentially expanding the attack surface.
Customer-premises equipment devices are not immune from malware and require bolstered network security to stay protected from attackers.
Intrusion prevention technology has had to continuously evolve in the past seven years to meet today's network security needs.
Black Hat 2014 illuminated the vulnerabilities of the Internet of Things, according to two IBM researchers who attended the conference.
Although many organizations have a policy that prohibits reusing corporate credentials on third-party sites, these password rules are hard to enforce.