Hackers Aim High to Hack the U.S Air Force

Latest program in HackerOne backed U.S military bug bounty effort takes aim at the USAF

First it was Hack the Pentagon, then last year Hack the Army and now in 2017 the Air Force is getting in on the bug bounty action. The original Hack the Pentagon bug bounty program debuted in March 2016 … more »

87 Percent of Companies Plan to Invest in Security-as-a-Service in the Next 12 Months

40 percent expect their network security spending to increase by 10 to 20 percent over the next year, a recent survey found.

Twistlock Raises $17M for Container Security

The funds will help the application container security startup expand into more markets and grow its product.

Penetration Testing: DIY or Hire a Pen Tester?

The best approach may be to do both: Hire a pen tester to get started, and learn to do it yourself for ongoing penetration testing. We give you everything you need to know about DIY and third-party pen testing.

Russian Hacker Sentenced to 27 Years in U.S. Prison

Roman Seleznev, the son of a Russian MP, caused over $169 million in damages by installing malware on point-of-sale machines.

Securing Docker, One Patch at a Time

The open-source Docker container project integrates many different security approaches, but like every other software project, it still has to deal with reported software vulnerabilities.

Lacework Emerges from Stealth with Polygraph Cloud Security

The startup's "zero-touch" cloud workload security platform eliminates the need to fine-tune policies and pore over logs to secure cloud environments.

Almost 40 Percent of Industrial Computers Were Hit by Cyber Attacks in 2H 2016

And a quarter of all targeted attacks were aimed at industrial targets, a recent study found.

Check Point Unifies Security Management

The company consolidates network, mobile and cloud security into a single architecture called Check Point Infinity.

64 Percent of Security Pros Can't Stop a Mobile Data Breach

And 51 percent believe the risk of mobile data loss is equal to or greater than that for PCs, a recent survey found.

How Docker Swarm Uses Transparent Root Rotation to Improve Security

Docker's swarmkit integrates multiple secure mechanisms including one known as Transparent Root Rotation.

Hajime Malware Infects Tens of Thousands of IoT Devices

The malware's peer-to-peer IoT device network numbers in the tens of thousands, according to Symantec.