When it comes to vendor security, all the handshakes and paperwork that go into a business deal tend to get in the way of proper audits and thorough vulnerability assessments.
What's the first step toward prioritizing security vulnerabilities? Know which open source components developers use in their code and monitor them for alerts using SAST tools.
With a well-planned, mature bug bounty program, security leaders can lessen the impact of the security talent shortage by tapping the white-hat hacker community.
The shipping industry — along with aviation — is particularly vulnerable to cyberattacks due to its use of outdated, insecure network technologies.
Two decades ago, Cris Thomas testified before Congress about various cybersecurity issues he uncovered as a white hat hacker. Today, he works as a penetration testing specialist for IBM X-Force Red.
Known vulnerabilities are the weaknesses that are most often exploited, but how can they be managed?
Sometimes, security professionals don't know how to approach a vulnerability assessment, especially when it comes to dealing with results from its automated report. Here's how to get started.
The first quarter of 2018 saw a rise in cybersecurity threats such as ransomware, Internet of Things (IoT) vulnerabilities and zero-day threats.
A recent report found that malicious crypto-miners have supplanted ransomware as the top healthcare cybersecurity threat.
The memcached vulnerability isn't new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record.