Hacker News

View All News

Hacker Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Hacker Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Security startups tackle the art of deception techniques

    Distributed decoy systems aim to take deception by defenders to the next level. Will a network of traps and lies change the rules of engagement? Continue Reading

  • The search for answers to ‘advanced threat’ defense

    Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats? Continue Reading

  • Emerging security threats from every which way

    Lethal threats to enterprise information security are emerging from every which way. This ISM Insider Edition looks at what security professionals are up against: state-sponsored attacks, the rise of hacking via social media, and the spread of small, relatively autonomous devices with sensors and networking chips.

    Besides the need to watch out for attacks from China, North Korea and other nations, today’s security pros must beware of the individual hacker, who has become more potent. Blended threats and improvements to man-in-the-middle exploit kits have made malware more available to less-skilled cybercriminals who can now launch drive-by attacks with just a few mouse clicks. Continue Reading

View All Evaluate

Manage Hacker

Learn to apply best practices and optimize your operations.

  • How to ensure a secure API

    Application program interfaces, or APIs, are nothing new in the IT world, but over the past ten years, public-facing APIs have risen from a handful to over 10,000. The function of APIs is to add capabilitiies to Web applications and mobile apps, allowing the automation of common processes that interact with services on other machines. APIs, in other words, let programs and websites "talk" to each other, which means APIs allow those programs and websites to provide even greater value to the end users.

    Like almost all good things in the world of IT, this raises security questions. When developers create an API, they can also inadvertently open a window to hackers. So this three-part guide looks carefully at both the nature of the security risk and also outlines best practices for managing your organization's use of outside APIs in a secure fashion, as well as making sure that any API's you make publicly available are not opening you up to attack. Continue Reading

  • Enterprise wireless security: Secure Wi-Fi today and beyond

    Enterprise wireless security issues are popping up left and right, wreaking havoc on individuals and enterprises alike. Expert Kevin Beaver looks at how to secure Wi-Fi. Continue Reading

  • Getting to the bottom of the software vulnerability disclosure debate

    The vulnerability disclosure debate rages on: Enterprises should know they are at risk, but vendors need time to patch flaws. Which side should prevail? Expert Michael Cobb discusses. Continue Reading

View All Manage

Problem Solve Hacker Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve