Ideally a penetration test should simulate a real world attack; in the real world, the attacker will always have some objective beyond “get into the network.” No matter who the attacker is, they are motivated by something that they are trying to accomplish – and getting into the network is only one step in that process for the attacker.
Apple announced its first-ever bug bounty program, offering computer security researchers up to $200,000 for each software bug they find that makes Apple products less secure.
The world's largest student-run cyber security event, founded 13 years ago by the New York University Tandon School of Engineering, will expand this year to NYU Abu Dhabi and the Indian Institute of Technology, Kanpur.
Ransomware will “wreak havoc” on the United States’ critical infrastructure community in 2016, according to a report by the Institute for Critical Infrastructure Technology (ICIT).
IT executives within critical infrastructure organizations see a need for public-private threat intelligence sharing partnerships (86 percent of respondents) to keep pace with escalating cybersecurity threats, according to a survey by The Aspen Institute and Intel Security.
Europe is emerging as a global leader in national cybersecurity enforcement. The European Union (EU) and countries connected to the Council of Europe and the European Economic Area, including Norway and Switzerland, have been most successful in implementing binding legal instruments in the area of cybercrime and cybersecurity.