A pen test can help organizations identify vulnerabilities in their systems and software before threat actors have a chance to exploit them.
Researchers discovered a new ATM fraud scheme that attacks both the front and back ends of ATM networks virtually, making it harder to remediate than traditional schemes that target physical machines.
Offensive security activities like cyberattack simulations, penetration testing and vulnerability assessments can help companies identify and remediate flaws before cybercriminals can exploit them.
IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup — many of which used the official branding of tournament sponsors to lure victims.
With a well-planned, mature bug bounty program, security leaders can lessen the impact of the security talent shortage by tapping the white-hat hacker community.
Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red.
Step into the shoes of an insurance company CEO chasing digital transformation. Read on as she tries to avoid missteps in this story about modernization, risks, fraud and user experience.
The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance.
In a new report, analyst firm Gartner predicted that enterprises around the world will spend up to $1.5 billion on IoT security in 2018.
To maximize the horsepower of its password cracking system, the IBM X-Force team built its own hardware to aid in penetration testing efforts.