How to overcome tech’s diversity barriers
Diversity remains a problem in IT. But If you’re a person of color and/or female, the situation is far from hopeless, particularly if you arm yourself with the latest information and advice from your peers.
Diversity remains a problem in IT. But If you’re a person of color and/or female, the situation is far from hopeless, particularly if you arm yourself with the latest information and advice from your peers.
The latest campaigns are bigger, more sophisticated, and causing far more damage as the attackers learn new techniques and collaborate with other groups
Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy
The tools would let attackers remotely take over any Solaris system around the world
All SSL certs are not created equal, and web browsers make matters worse by not clearly showing what security you’re actually getting
Researchers found commonalities between tools used against Solaris 20 years ago and modern-day attacks deployed against Windows PCs
Safeguard the software you develop from the start with these Jenkins plug-ins and integrations, which automate security testing
New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure
The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou
Look to these clever open source tools to keep secrets out of source code, identify malicious files, block malicious processes, and keep endpoints safe
High-profile breaches are just the tip of the iceberg. Many have never been detected or disclosed--and without a major infrastructure changes it's only going to get worse
Despite all the bad news in information security in 2016, some positive developments may finally shift momentum
The move from SHA-1 to SHA-2, a Congressional victory over backdoors, and the rise of encrypted communications are leading us toward a more secure world
Nmap 7.40 has new scripts that give IT administrators improved network mapping and port scanning capabilities
Developers can use Project Wycheproof to test cryptographic algorithms against a library of known attacks to uncover potential weaknesses