These five retail cybersecurity tips will help organizations mitigate cyberattacks and provide customers with the safest shopping experience during the holiday season.
The IBM X-Force Red team recently ran into trouble on a black-box penetration testing assignment. Here's how the testers overcame the obstacles to ultimately establish a solid adversarial operation.
Enterprises Using IaaS or PaaS Have 14 Misconfigured Instances on Average, Cloud Adoption Study Finds
A cloud adoption report found that companies that deploy infrastructure-as-a-service (IaaS) or platform-as-a-service (PaaS) have an average of 14 misconfigured instances running at a given time.
Security researchers reported that a new bot called DemonBot is targeting Hadoop clusters to execute distributed denial-of-service (DDoS) attacks.
Dimitry Snezhkov didn't touch a computer until he was 18. Now he spends his days penetration testing to uncover security gaps and his nights meditating on the balance of life.
Many IT teams have developed a habit of treating application security as an afterthought. As a result, it might be their greatest vulnerability.
With the success and lessons learned from our X-Force Command Cyber Range, IBM is excited to launch its new mobile command center, the X-Force Command Cyber Tactical Operations Center (C-TOC).
Researchers uncovered a YouTube scam in which several fraudulent channels urge unsuspecting "Doctor Who" fans to submit personal data to supposedly stream the British science fiction show.
Over the next two months, companies should educate and test their employees to prepare for the rise in phishing attacks related to benefits enrollment and holiday party and charity campaign planning.
Your eight-character password is not as secure as you might think, but there are several simple actions you can take to truly strengthen your password security.