This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his
The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated some high-profile websites last fall, leading some to think the internet had been broken.
The U.S. Air Force is seeking vetted hackers to probe its public Web sites while a top Pentagon official is considering a similar program to test sensor networks used for HVAC and other physical systems.
Ransomware is rampant. And a SOURCE Boston 2017 panel agreed one of the major reasons is a lack of communication: It is under-reported, there is not enough information sharing about it, and not enough public awareness.
The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set
The new release of the OWASP Top 10 list is out from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs
Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback
The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, up from $294 the year before, according to security firm Symantec.