Hack the Army - and Get Paid for It

The U.S Army is the next branch of the Department of Defence to embrace the bug bounty bounty model in an effort to improve security.

The U.S. Army wants you - to hack its systems. That's right. The U.S. Army is now inviting hackers to take direct aim at its software, as part of a new bug bounty program that is set to launch later this … more »

Top 5 Rootkit Threats and How to Root Them out

Rootkits are tough to detect and tough to eradicate, making them an especially tricky security threat.

3 Noteworthy Windows Server 2016 Security Features

Enhanced OS security is often little more than marketing hype, but Microsoft's new Windows Server 2016 features really move the security needle.

FireEye CEO Stakes Growth on Multiple Deployment Options

FireEye added 287 new customers and fired some 350 employees in its fiscal third quarter, seeing 13 percent year-over-year growth in revenue.

4 Essential IoT Security Best Practices

With IoT security top of mind in the wake of recent IoT-based attacks, here are four tips on improving your Internet of Things security measures.

How to Hire an Ethical Hacker

An ethical hacker can help you find application security vulnerabilities. So how do you hire an ethical hacker?