![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094603/microsoft1-400x200.jpg)
Organizations fail to maximize use of Microsoft 365 security features
While the majority of IT decision makers (88 percent) say they have ‘fully deployed’ Microsoft 365 in their organization, most have yet to adopt the software suite to its …
![Cybersecurity risk management](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092752/cybersecurity_risk_management-400x200.jpg)
Companies should disclose cybersecurity risk management efforts
Research finds that when one company experiences a cybersecurity breach, other companies in the same field also become less attractive to investors. However, companies that …
![mobile work](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095708/mobile_work-400x200.jpg)
Risky transactions on mobile devices increase 138% since 2017
Risky transactions on mobile devices are showing an increase of 138% since 2017, iovation survey of 802 consumers from the United Kingdom and 802 consumers from the United …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104208/IoT-400x200.jpg)
Together, AI and the IoT are having a bigger-than-expected impact
A survey of global business leaders reveals the most significant predictor in realizing value from Internet of Things (IoT) initiatives across an organization is the heavy use …
![ThreatConnect whitepaper](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092743/threatconnect-400x200.jpg)
Whitepaper: SIEM + Threat Intelligence
SIEMs are a powerful tool for collecting and correlating event data and have a well-deserved place within your security infrastructure for centralized log management. But to …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194930/abstract3-400x200.jpg)
Week in review: Keeping up with ransomware, critical PHP RCE exploited, DevOps firewall
Here’s an overview of some of last week’s most interesting news and articles: Leading domain name registrars suffered data breach Web technology company Web.com …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112826/biohazard-400x200.jpg)
Keeping up with the evolving ransomware security landscape
Cybercrime is ever-evolving, and is consistently becoming more effective and damaging. While the range of attack vectors available to malicious actors are vast, ransomware …
![Moogsoft Express](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092748/moogsoft-express-400x200.jpg)
New infosec products of the week: November 1, 2019
Jetico releases BestCrypt Volume Encryption Enterprise Edition for Mac Jetico launched BestCrypt Volume Encryption – Enterprise Edition for Mac. Expanding on many years of …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093759/arrow-400x200.jpg)
How has your organization’s risk level changed in the past 12 months?
More than half of risk professionals worldwide say their organization’s risk levels have increased in the past 12 months, according to new research from ISACA, CMMI Institute …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095934/tunnel-1-400x200.jpg)
IT teams are embracing intent-based networking, investing in AI technologies
The network is vital to today’s digital business. Whether maximizing employee productivity, optimizing customer experience or keeping data protected and secure, the network is …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101644/money-400x200.jpg)
Security services and network security still top spending priorities for CISOs in MENA
Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019, according to …
![flame](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102359/flame-flat-400x200.jpg)
Leading domain name registrars suffered data breach
Web technology company Web.com and its subsidiaries – domain name registrars Register.com and Network Solutions – have suffered a data breach. What happened? …