The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
This list of notable 2016 data breaches can serve as a cheat sheet for a security professional who is pressed for the latest tech news during the holidays.
Information sharing is key to the success of the cybersecurity industry. Learn more about ethical hacking and bug bounty programs at Black Hat Europe 2016.
The implications of information security in professional sports go way beyond X's and O's. Still, many organizations lack a CISO to oversee data security.
Distributed denial-of-service (DDoS) attacks have been all over the news in recent months, with hacktivist groups taking major targets completely offline. According to IBM Managed Security Services data, the vast majority of DDoS attacks come in one...
A group of interns collaborated with experts on the IBM Managed Security Services team to create a global IBM hacking competition.
The machines rose at DEF CON 24 in Las Vegas. Autonomous hacking machines successfully analyzed, patched and exploited software at the conference.
Millennials are not the problem; they're the future. The ability to attract and retain millennial talent is a vital to long-term success in security.
The second season of "Mr. Robot" could focus on IoT and hacking a connected building, just like the IBM X-Force team was able to do in real life.
Social media account takeovers have recently impacted some high-profile individuals and groups, but a few simple measures can greatly reduce this risk.