A pen test can help organizations identify vulnerabilities in their systems and software before threat actors have a chance to exploit them.
Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red.
The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance.
Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he's really one of the good guys.
Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
IBM X-Force Red marked its first anniversary with the addition of security specialists, including Space Rogue, bolstering the team's talent roster.
Today IBM X-Force Red launches a collaboration with the Watson IoT Platform to help ensure that all IoT solutions get our special brand of hacker love.
Test-driven development was created to inspire security analysts and developers to reconsider the way they plan, design and test software.
The decision by Consumer Reports to include security ratings in its product reviews could have implications for the way connected devices are designed.
A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.