With a well-planned, mature bug bounty program, security leaders can lessen the impact of the security talent shortage by tapping the white-hat hacker community.
Sometimes, security professionals don't know how to approach a vulnerability assessment, especially when it comes to dealing with results from its automated report. Here's how to get started.
The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance.
Many organizations still struggle with application and web security due to numerous persistent challenges, most of which relate to lack of oversight, poor planning and human error.
As data breaches gain public attention, vulnerability disclosure becomes an increasingly crucial part of the incident response process.
Endpoint management and security is a daily battle. You need a solution that helps you discover, manage and secure your endpoints faster, more easily and more consistently.
IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.
One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.
Some are wary of the Ugly Duckling due to his advanced hacking abilities, but when it comes to security testing, he's really one of the good guys.