A pen test can help organizations identify vulnerabilities in their systems and software before threat actors have a chance to exploit them.
Topics of discussion at this year's Black Hat conference included the Internet of Things (IoT) in smart cities, the latest advancements in vulnerability management and more.
Whether you're most interested in smart city security, vulnerability management or an epic game of CTF, we'll help you get the most out of your time in Las Vegas this week.
In the process of fixing a flaw discovered in March 2018, security researchers from Drupal discovered another vulnerability that could enable threat actors to deliver cryptocurrency mining malware.
Offensive security activities like cyberattack simulations, penetration testing and vulnerability assessments can help companies identify and remediate flaws before cybercriminals can exploit them.
When it comes to vendor security, all the handshakes and paperwork that go into a business deal tend to get in the way of proper audits and thorough vulnerability assessments.
What's the first step toward prioritizing security vulnerabilities? Know which open source components developers use in their code and monitor them for alerts using SAST tools.
With a well-planned, mature bug bounty program, security leaders can lessen the impact of the security talent shortage by tapping the white-hat hacker community.
Sometimes, security professionals don't know how to approach a vulnerability assessment, especially when it comes to dealing with results from its automated report. Here's how to get started.
The refusal of top leadership to fund security initiatives often translates to explicit, willful risk acceptance.