Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.
SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
As part of HackerOne's effort to improve open source security, the vulnerability disclosure firm made its bug bounty program available for free.
The Wireshark development team addressed dozens of vulnerabilities, segmentation flaws and bugs with the latest version of its network protocol analyzer.
DblTek GSM gateways have a hidden backdoor password that allows root shell access. How can users protect themselves from this vulnerability?
Although security researchers discovered Shellshock more than two years ago, it remains popular among fraudsters with basic skill sets and light wallets.
A recent Linux update patched a vulnerability that enabled fraudsters to use heap spraying methods to execute arbitrary code and escalate permissions.
The SAP HANA security evolution started in 2011, peaked in 2014 and continues to deliver critical enhancements to provide analysts with greater visibility.
Mind the Gap: Closing Vulnerability Management Exposure With IBM BigFix and QRadar Vulnerability Manager (QVM)
IBM BigFix and QRadar Vulnerability Manager (QVM) can help security professionals close the vulnerability management exposure gap and prevent breaches.
A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.