![tools](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105222/tools-400x200.jpg)
Half of IT pros don’t know how to improve their security posture
Mid-market enterprises have high confidence in their cybersecurity defenses, but they struggle to defend against malicious activity that has become more sophisticated and …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105236/money-400x200.jpeg)
Are businesses spending their money on the wrong IT security?
Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its 2017 Thales Data Threat Report, issued in conjunction with …
![transformation](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110303/transformation-400x200.jpg)
Connected homes and new hacking risks
Eight out of ten US consumers have a home data network and more than a third of them connect entertainment systems, gaming consoles and other smart devices to the Internet, …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110014/robot-1-400x200.jpg)
Five emerging technology trends essential to business success
People hold the power to shape and apply technology to create positive change, improve lives, and transform business and society, according to Accenture Technology Vision …
![lighter](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113536/lighter-400x200.jpg)
Most organizations are unaware of daily malicious activity
A new DomainTools survey of more than 550 security analysts, IT managers, and executives revealed that the majority of organizations are struggling to monitor and prevent …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110509/usa-flag-1-400x200.jpg)
Top 10 most malware-infected US cities
Webroot revealed the top 10 most malware-infected US cities. According to Webroot’s data, Houston is the most infected US city with 60,801 infected devices. The research …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
Security budgets shifting from prevention to detection
According to industry estimates, enterprises have historically spent more than 75% of their infosec technology budgets on preventative technologies. According to a new survey …
![consumer](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105245/consumer-400x200.jpg)
Consumers worried about privacy more than ever
84% of U.S. consumers expressed concern regarding the security of their personally identifiable information (PII) and 70% told IDC that their concern is greater today than …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105254/ddos_attacks-400x200.jpg)
Innovation and exploitation fuel DDoS attack landscape
Arbor Networks released its 12th Annual Worldwide Infrastructure Security Report offering direct insights from network and security professionals at global service providers, …
![corporate cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105250/corporate-cloud-400x200.jpg)
Key cloud adoption trends and challenges for government entities
Cloud computing has become a trending topic for federal CIOs in the last few years, according to Netwrix. In response to the Obama administration’s cloud-first …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113423/world-400x200.jpg)
Family dynamics in a connected world
A new global study by Intel Security aims to better comprehend how families’ attitudes and habits are evolving as their homes and lifestyles become increasingly connected. …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105306/usa-400x200.jpg)
54% of Americans say existing cyber security laws aren’t getting the job done
As President Trump and the new Congress stake out a 2017 agenda, Americans want to see a pressing need to modernize laws dealing with the digital economy and stepped up …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality