The ABCs of Hacking a Voting Machine A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.
Every Week Is Shark Week in Cyberspace Your data, identities, and credentials are cyber chum. Here's how to protect yourself from the feeding frenzy.
5 Ways Small Security Teams Can Defend Like Fortune 500 Companies Keep your company protected with a mix of old- and new-school technologies.