Open source

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

Software security: There’s more to it than bug-bounty programs

Take full advantage of white-hat hackers to help you secure your code. And still do all the other security stuff you should do before you release your code

What can organisations learn from hackers? Inside Nuix's Black Report

Despite all the noise from security vendors, most hackers and pentesters can worm into a network and exfiltrate valuable data in under a day, including for critical systems, according to a recent report from Nuix.

Security alert: Hackers shift focus from ransomware to cryptojacking

Hackers have been increasingly moving towards cryptojacking attackshijacking computing resources and using that to mine cryptocurrency.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

Partner Content
5 Cybersecurity Myths for Linux Users

Unfortunately, cyber security is no joking matter nowadays – the consequences of a weak system could be devastating for any company.

Online voting is impossible to secure. So why are some governments using it?

If you thought electronic voting machines were insecure, wait 'til you meet online voting.

How lean development improved software security at Fannie Mae

Continual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.

The best privacy and security apps for Android

Forget malware scanners or over-the-top security suites: These are the apps that'll actually improve your security and protect your privacy on Android.

Hortonworks announces DSS to connect data across Cloud and On-prem data lakes

Data Steward Studio (DSS) gives enterprises consistent security and governance for data assets across big data repositories.