![SIEM](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/28155258/siem-blue-400x200.jpg)
Traditional SIEM platforms no longer meet the needs of security practitioners
Panther Labs released the findings from their report which surveyed over 400 security professionals who actively use a SIEM platform as part of their job, including CISOs, …
![Baha Zeidan](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/01113801/baha_zeidan_2-azalea_health-1-400x200.jpg)
Healthcare cybersecurity under attack: How the pandemic affected rural hospitals
Ever since it started, the pandemic has greatly affected the overall threat landscape, with different organizations falling victims to cyberattacks. Understandably, those who …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/02205910/insider_threat-hns1-400x200.jpg)
Enterprises are missing the warning signs of insider threats
Organizations struggle to identify the warning signs of insider threats, according to a report by the Ponemon Institute. The report surveyed a global pool of 1,249 IT and IT …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Enterprising criminals are selling direct access to cloud accounts
Lacework released its cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses. The rapid shift of applications …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27102008/ransomware_1_26082021-400x200.jpg)
Ransomware attacks increased by 288% in H1 2021
Analysis from NCC Group’s Research Intelligence and Fusion Team (RIFT) has highlighted the growing threat of ransomware around the world. The number of ransomware attacks …
![mobile security](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18175826/mobile_security-device-400x200.jpg)
Consumers satisfied with mobile security, yet account privacy and protection concerns remain
More than half of wireless subscribers polled were extremely or somewhat satisfied with the security offered by their mobile operators, according to a mobile security survey …
![Joe Slowik](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/30155348/joe_slowik_2-gigamon-400x200.jpg)
Critical infrastructure today: Complex challenges and rising threats
Cyber attacks against critical national infrastructure are escalating. The ransomware hit on Colonial Pipeline was a clanging wake-up call for the public, but cybersecurity …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095434/industrial-400x200.jpg)
The cybersecurity of industrial companies remains low, potential damage can be severe
Positive Technologies released a research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020. …
![Hands](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194424/hands-keyboard-400x200.jpg)
Why companies should never hack back
After major cyberattacks on the Colonial Pipeline and on meat supplier JBS, the idea of allowing companies to launch cyberattacks back at cyber criminals was proposed. This …
![attacks](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27135755/attacks-fire-400x200.jpg)
Increase in credential phishing and brute force attacks causing financial and reputational damage
Abnormal Security released a report which examines the escalating adverse impact of socially-engineered and never-seen-before email attacks, and other advanced email …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/17172120/lock-green-connect-400x200.jpg)
How enterprises use security operations to modernize their business
CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105327/vulnerability-400x200.jpg)
Vulnerability management is facing three core problems: Here’s how to solve them
The COVID-19 pandemic has placed enormous stress on information security professionals. A threat landscape that was already growing more complex by the minute now presents an …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints