![fingers crossed](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095347/fingers_crossed-400x200.jpg)
Should enterprises delay efforts to remediate most vulnerabilities?
Companies today appear to have the resources needed to address all of their high-risk vulnerabilities. The research demonstrates that companies are getting smarter in how they …
![Update](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103256/update-400x200.jpg)
Most out of date applications exposed: Shockwave, VLC and Skype top the list
More than half (55%) of PC applications installed worldwide are out-of-date, making PC users and their personal data vulnerable to security risks. Avast’s PC Trends Report …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
SSDP amplification attacks rose 639%
The Nexusguard Q3 2018 Threat Report has revealed the emergence of an extremely stealthy DDoS attack pattern targeting communications service providers (CSPs). Comparison …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
Cybercrime could cost companies trillions over the next five years
Companies globally could incur $5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks, as dependency on complex internet-enabled …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110633/ddos-world-400x200.jpg)
Researchers analyze DDoS attacks as coordinated gang activities
In a new report, NSFOCUS introduced the IP Chain-Gang concept, in which each chain-gang is controlled by a single threat actor or a group of related threat actors and exhibit …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105558/facebook-400x200.jpg)
Most Facebook users aren’t aware that Facebook tracks their interests
Too many Facebook users aren’t aware that the company uses the information provided by them and their actions on the platform and outside of it to create a list of their …
![collaboration](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111540/collaboration-400x200.jpg)
Protecting privileged access in DevOps and cloud environments
While security strategies should address privileged access and the risk of unsecured secrets and credentials, they should also closely align with DevOps culture and methods to …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112759/risk-400x200.jpg)
Risk managers see cybersecurity as the biggest threat to business
Sword GRC canvassed amost 150 risk managers from highly risk-aware organizations worldwide for their opinions. Overall, cybersecurity was seen as the biggest risk to business …
![F5 report](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095423/F5-report-400x200.jpg)
How IT organizations are transforming to meet the demands of the digital economy
The 2019 State of Application Services report from F5 Networks showed that organizations regard application services as vital for cloud adoption and, ultimately, for success …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113233/numbers-400x200.jpg)
Encryption is key to protecting information as it travels outside the network
A new Vera report reveals stark numbers behind the mounting toll of data breaches triggered by cybercrime and accidents. One of the most recognized and mandated security …
![cybercrime](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105649/cybercrime-400x200.jpg)
The costs of cyberattacks increased 52% to $1.1 million
Radware has released its 2018-2019 Global Application and Network Security Report, in which survey respondents estimate the average cost of a cyberattack at $1.1M. For those …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
Companies still struggle to detect IoT device breaches
Only 48% of businesses can detect if any of their IoT devices suffers a breach, according to Gemalto. This comes despite companies having an increased focus on IoT security: …