![light](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100048/light-400x200.jpg)
Companies risk revenue growth due to innovation achievement gap
While a majority of CEOs express strong confidence in the effectiveness of their current IT systems, most are struggling to close the innovation achievement gap to drive …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095839/email-400x200.jpg)
Email security industry miss rates when encountering threats are higher than 20%
Email security miss rates are definitely a huge issue. Malicious files regularly bypass all of today’s leading email security products, leaving enterprises vulnerable to …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102220/bulb-400x200.jpg)
State CIOs see innovation as critical priority, only 14% report extensive innovation
Most state CIOs see innovation as a major part of their job – 83% said innovation is an important or very important part of their day-to-day leadership responsibilities – …
![secure](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111740/secure-400x200.jpg)
Download: State of Breach Protection 2020 survey results
What are the key considerations security decision-makers should take into account when designing their 2020 breach protection? To answer this, Cynet polled 1,536 cybersecurity …
![Internet Explorer](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/21163538/ie-tunnel-400x200.jpg)
Micropatch simulates workaround for recent zero-day IE flaw, removes negative side effects
ACROS Security has released a micropatch that implements the workaround for a recently revealed actively exploited zero-day RCE flaw affecting Internet Explorer …
![Citrix](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/09121726/citrix-logo-1-400x200.jpg)
First patches for the Citrix ADC, Gateway RCE flaw released
As attackers continue to hit vulnerable Citrix (formerly Netscaler) ADC and Gateway installations, Citrix has released permanent fixes for some versions and has promised to …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092834/industrial-400x200.jpg)
Researchers create OT honeypot, attract exploits and fraud
Trend Micro announced the results of research featuring a honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted …
![Mitsubishi](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/21123750/mitsubishi-logo-stars-400x200.jpg)
Mitsubishi Electric discloses data breach, possible data leak
Japanese multinational Mitsubishi Electric has admitted that it had suffered a data breach some six months ago, and that “personal information and corporate confidential …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
Data-driven vehicles: The next security challenge
Companies are increasingly building smart products that are tailored to know the individual user. In the automotive world, the next generation passenger vehicle could behave …
![Enzoic](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/10141352/enzoic2-400x200.jpg)
Review: Enzoic for Active Directory
Seemingly every day news drops that a popular site with millions of users had been breached and its user database leaked online. Almost without fail, attackers try to use …
![Kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093639/kubernetes-400x200.jpg)
Techniques and strategies to overcome Kubernetes security challenges
Five security best practices for DevOps and development professionals managing Kubernetes deployments have been introduced by Portshift. Integrating these security measures …
![cloud money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093749/cloud-money1-400x200.jpg)
Revenue from cloud IT infrastructure products declines
Vendor revenue from sales of IT infrastructure products (server, enterprise storage, and Ethernet switch) for cloud environments, including public and private cloud, declined …
Featured news
Sponsored
Don't miss
- Some good may come out of the CrowdStrike outage
- Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
- eBook: 20 tips for secure cloud migration
- Microsoft 365 users targeted by phishers abusing Microsoft Forms
- Enhancing threat detection for GenAI workloads with cloud attack emulation