The U.S Army is the next branch of the Department of Defence to embrace the bug bounty bounty model in an effort to improve security.
The U.S. Army wants you - to hack its systems. That's right. The U.S. Army is now inviting hackers to take direct aim at its software, as part of a new bug bounty program that is set to launch later this … more »
Rootkits are tough to detect and tough to eradicate, making them an especially tricky security threat.
Enhanced OS security is often little more than marketing hype, but Microsoft's new Windows Server 2016 features really move the security needle.
FireEye added 287 new customers and fired some 350 employees in its fiscal third quarter, seeing 13 percent year-over-year growth in revenue.
With IoT security top of mind in the wake of recent IoT-based attacks, here are four tips on improving your Internet of Things security measures.
An ethical hacker can help you find application security vulnerabilities. So how do you hire an ethical hacker?