![vectors](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103046/vectors-400x200.jpeg)
Three out of four DDoS attacks target multiple vectors
Three out of every four DDoS attacks employed blended, multi-vector approaches in the second quarter of 2017, according to Nexusguard. Distribution of DDoS attack vectors The …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103054/ddos-400x200.jpg)
Large DDoS attacks over 50 Gbps have quadrupled between 2015 and 2017
Organizations are experiencing an increase in the magnitude of DDoS attacks, with the average size of attacks over 50 Gbps quadrupling in just two years, according to A10 …
![cloud migration](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103057/cloud_migration-400x200.jpg)
Standard cloud migration models are insufficient when moving mission critical workloads
Enterprises have found that standard cloud migration models are insufficient when moving mission critical workloads and require a specialized approach, according to a study …
![criminal hacking](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103100/criminal_hacking-400x200.jpg)
Criminal hacking: Top technology risk to health, safety and prosperity
Americans believe criminal hacking into computer systems is now a top risk to their health, safety and prosperity. Criminal hacking, a new ESET survey finds, outranks other …
![corporate cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105250/corporate-cloud-400x200.jpg)
Enterprise cloud adoption and IaaS security
Barracuda Networks and research firm Vanson Bourne polled 300 IT decision makers from organizations across the US on their use of public cloud Infrastructure as a Service …
![fish phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114006/fish-400x200.jpg)
46,000 new phishing sites are created every day
An average of 1.385 million new, unique phishing sites are created each month, with a high of 2.3 million sites created in May. The data collected by Webroot shows today’s …
![connections](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105436/connections-400x200.jpg)
Legacy networks holding back cloud and digital transformation
A new global survey by Riverbed Technology, which includes responses from 1,000 IT decision makers across nine countries, revealed an incredible level of agreement that legacy …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09110001/windows-400x200.jpg)
Maintaining Windows 10 security tops list of enterprise challenges
Companies are experiencing significant challenges in their attempts to keep their endpoints secure. Maintaining Windows 10 security topped the list of challenges with over …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103112/businessman-400x200.jpeg)
The evolving nature of the CISO role
As IT security increasingly becomes a priority, CISOs’ influence within companies is growing. However, security strategy in many organizations is still largely reactive and …
![war games](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103132/war_games-400x200.jpg)
The three least effective enterprise security measures
Fifty-nine percent of respondents to a Bitglass survey at Black Hat USA 2017 identified phishing as the best data exfiltration strategy, as human error and ignorance will …
![defend](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110116/defend-400x200.png)
Number of lost, stolen or compromised records increased by 164%
According to Gemalto’s Breach Level Index, 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103119/user-400x200.jpg)
Infosec weakest links: Negligent employees and poor password policies
54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach. Password …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality