Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Learn a little more about Derrick Webber, penetration testing team lead, CGI Group Inc., who will be speaking at this year's SC Congress event in Toronto.
It’s time to take a serious look at what the current state of penetration and vulnerability assessment actually is, says Technology Editor Peter Stephenson.
We are "ethical hackers" or "white hat hackers." We are penetration testers. Never let us be aligned with the mass media's view of hackers.
Analysis and testing covers the entire gamut of testing - from forensic tools to penetration testing.
Strategic Cyber’s Cobalt Strike application is a serious penetration testing and educational tool.
Swiss penetration testing company High-Tech Bridge reported the vulnerability to NASDAQ.
Swiss penetration testing firm High-Tech Bridge reported the XSS vulnerabilities affecting two Yahoo domains.
A penetration testing firm analyzed publicly reported compromises over the last 10 years.
Facebook is in the process of testing technology that will monitor what your cursor is hovering over on its site, as well as whether a user's newsfeed is visible on a mobile device.
The latest version of the payment security industry's data safeguarding standard should also include mandates and guidance around risk management, penetration testing and mobile.
The bank also oversaw last year's "Waking Shark II" simulated cyber attacks throughout London.
The Federal Trade Commission alleges that the medical testing provider exposed the data of more than 9,000 consumers, putting them at risk of identity theft.
Testing company NSS Labs released two studies comparing the security of popular browsers, and it was the best of times and the worst of time for Internet Explorer.
Internal Scan - Cloud Edition from netVigilance offers a full vulnerability testing suite that can scan pretty much anything with an IP address and report on any vulnerabilities.
A strong cyber threat intelligence program should include proactive analysis of network traffic, testing of theories based on our understanding of human behavior.
Companies who leverage the cloud have concerns over the security of their data. The migration has increased demand for incident response pros, including reverse engineers and malware analysts.
Anyone designing a new system such as this should take security into account from the beginning. The amount of personal information that could be harvested by any breach is truly alarming.
Virtual machine makes deployment easy, high-gain antenna for Wi-Fi cracking.
A hacktivist group, calling itself KDMS Team, took credit for compromising the Rapid7 and Metasploit websites on Friday.
The fallout from the NSA surveillance leaks continues to make news.