![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103407/architecture-1-400x200.jpg)
Security teams need to become more proactive and risk-driven
83% of companies would suffer business damage during the first 24 hours of an outage and thereafter, which comes as no surprise with recent surges in ransomware and other …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094612/week_in_review1-400x200.jpg)
Week in review: CVE + MITRE ATT&CK methodology, new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: (IN)SECURE Magazine issue 70 released (IN)SECURE Magazine is a free …
![](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/04100922/products_week_05112021-400x200.jpg)
New infosec products of the week: November 5, 2021
Here’s a look at the most interesting product releases from the past week, featuring releases from Cynamics, Imperva, Linux Foundation, Netscout and Tenable. Nessus 10 is out, …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092943/aid2-400x200.jpg)
Software development: Why security and constant vigilance are everyone’s responsibilities
An report from May 2021 has found that 81% of developers admit to knowingly releasing vulnerable apps, and 76% experienced pressure to sacrifice mobile security for …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094911/criminal1-400x200.jpg)
77% of rootkits are used for espionage purposes
In a new report, Positive Technologies analyzes this past decade’s most infamous families of rootkits – programs that hide the presence of malicious software or …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Organizations seldom prioritize cybersecurity over business outcomes
55% of large companies are not effectively stopping cyberattacks, finding and fixing breaches quickly, or reducing the impact of breaches, according to a research study from …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100013/user-400x200.jpg)
Fragmented approach to identity security management creates risk
One Identity released global survey findings that revealed a significant increase in digital identities on a global scale. This phenomenon – known as identity sprawl – has …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100228/ddos-400x200.jpg)
Blocked DDoS events up 75% in the first nine months of 2021
Radware has published results from its report which provides an overview of the DDoS attack landscape, application attack developments, and unsolicited network scanning …
![GitLab](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105940/gitlab-400x200.jpg)
Tens of thousands unpatched GitLab servers under attack via CVE-2021-22205
Attackers are actively exploiting an “old” vulnerability (CVE-2021-22205) to take over on-premise GitLab servers, Rapid7 researcher Jacob Baines warns. The …
![communication](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09094006/communication-400x200.jpg)
Lean security: How small cybersecurity teams perform at Fortune 2000 levels
There’s a widespread misconception that small IT security teams, or “lean sec teams”, cannot protect their organizations as comprehensively as bigger security teams who enjoy …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092947/lock-400x200.jpg)
How to ease password pains while maintaining security
As much as any industry, healthcare must deal with a security landscape that is fraught with challenges and tensions. Health delivery organizations (HDOs) operate under …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093824/money-400x200.jpg)
Top 10 ways attackers are increasing pressure on their ransomware victims to pay
Sophos researchers have detailed how ransomware attackers are implementing a wide range of ruthless pressure tactics to persuade victims to pay the ransom. Their research is …
Featured news
Sponsored
Don't miss
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data
- Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
- Cross-industry standards for data provenance in AI
- Shuffle Automation: Open-source security automation platform