A recent Dailymotion hack means the account details and email addresses of 85 million users have potentially been compromised.
Companies have a vested interest when it comes to ferreting out IT problems before cybercriminals manage to launch attacks in the wild. The recent Mirai infections are proof positive that compromised Internet of Things (IoT) devices paved the way...
Information sharing is key to the success of the cybersecurity industry. Learn more about ethical hacking and bug bounty programs at Black Hat Europe 2016.
The implications of information security in professional sports go way beyond X's and O's. Still, many organizations lack a CISO to oversee data security.
Distributed denial-of-service (DDoS) attacks have been all over the news in recent months, with hacktivist groups taking major targets completely offline. According to IBM Managed Security Services data, the vast majority of DDoS attacks come in one...
A group of interns collaborated with experts on the IBM Managed Security Services team to create a global IBM hacking competition.
The machines rose at DEF CON 24 in Las Vegas. Autonomous hacking machines successfully analyzed, patched and exploited software at the conference.
Millennials are not the problem; they're the future. The ability to attract and retain millennial talent is a vital to long-term success in security.
Humans will never be fast enough. That's the theory behind the DARPA's upcoming DEF CON hacking contest, the Cyber Grand Challenge (CGC).
The second season of "Mr. Robot" could focus on IoT and hacking a connected building, just like the IBM X-Force team was able to do in real life.