The History of Ethical Hacking and Penetration Testing

June 7, 2015

When we think of hackers, the black hat variety usually comes to mind. However, white hat hacking, also known as "ethical hacking", has been around as early as the 1960's. Check out the infographic above to see how it all started, where it is today, and trends we expect to see in the near future.

Spotlight

Trusteer (IBM Security)

Trusteer is the leading provider of endpoint cybercrime prevention solutions that protect organizations against financial fraud and data breach. Hundreds of organizations and millions of end users rely on Trusteer solutions to help protect their computers and mobile devices from online threats that are invisible to legacy security solutions. The IBM Security Trusteer cybercrime prevention architecture combines multi-layer security software and real-time threat intelligence to achieve sustainable protection against malware and phishing attacks on web applications and achieve regulatory compliance. Leading organizations such as HSBC, Santander, SunTrust and Fifth Third are among Trusteer’s clients.

Other Infographics
news image

Cyber Security What Makes a Strong Password

Infographic | December 1, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Cyber Security Awareness

Infographic | December 20, 2019

Cyber security awareness promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks.

Read More
news image

Cyber attack infographic

Infographic | December 25, 2019

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

Read More
news image

Application Security: Paving the Way to Counter Emerging Cyberthreats

Infographic | June 23, 2023

Uncover essential strategies and techniques for application security and empower businesses to protect their digital assets and fortify digital defenses against emerging threats and vulnerabilities.

Read More
news image

Crowdstrike Incident Response

Infographic | June 13, 2022

A modern approach to rapid response and recovery from today’s widespread security incidents. Navigating the best path through the labyrinth of a widespread ransomware attack will determine the organizational impact and recovery cost to the business.

Read More

Spotlight

Trusteer (IBM Security)

Trusteer is the leading provider of endpoint cybercrime prevention solutions that protect organizations against financial fraud and data breach. Hundreds of organizations and millions of end users rely on Trusteer solutions to help protect their computers and mobile devices from online threats that are invisible to legacy security solutions. The IBM Security Trusteer cybercrime prevention architecture combines multi-layer security software and real-time threat intelligence to achieve sustainable protection against malware and phishing attacks on web applications and achieve regulatory compliance. Leading organizations such as HSBC, Santander, SunTrust and Fifth Third are among Trusteer’s clients.

Events