The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance.
Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he's really one of the good guys.
Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
IBM X-Force Red marked its first anniversary with the addition of security specialists, including Space Rogue, bolstering the team's talent roster.
Today IBM X-Force Red launches a collaboration with the Watson IoT Platform to help ensure that all IoT solutions get our special brand of hacker love.
Test-driven development was created to inspire security analysts and developers to reconsider the way they plan, design and test software.
The decision by Consumer Reports to include security ratings in its product reviews could have implications for the way connected devices are designed.
A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.
Security leaders must weigh the convenience and speed of in-house pen testing against the cost of maintaining a team to conduct security tests.
Penetration testing is one of the most effective ways to monitor the security of your IT environment and identify vulnerabilities.