![lightbulb](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100102/lightbulb-2824864-400x200.png)
69% of organizations believe they can’t respond to critical threats without AI
Businesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, a study from the Capgemini Research Institute has found. …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113326/vault-400x200.jpg)
The highly competitive global encryption management solutions market continues to grow
The increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption …
![storm](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104322/storm-400x200.jpeg)
Magecart compromised 17,000+ sites through unsecured Amazon S3 buckets
We often hear about misconfigured Amazon S3 buckets exposing sensitive business and customer data, but there’s another present danger: Magecart attackers have been …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102340/face2-400x200.jpg)
Inside the NIST team working to make cybersecurity more user-friendly
Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to respond to security warnings, maintain many complex passwords, and make security …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102515/fire-400x200.jpeg)
More than 2 million cyber incidents in 2018 created $45 billion in losses
The financial impact of ransomware rose by 60%, losses from business email compromise (BEC) doubled, and cryptojacking incidents more than tripled, all despite the fact that …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094406/cloud1-400x200.jpg)
Prioritizing security efforts is key to data security in the cloud
32% of healthcare organizations store a wide range of sensitive data in the cloud, including healthcare data and personally identifiable information (PII) of customers and …
![mobile apps](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102223/mobile-apps-400x200.jpg)
How mobile use cases in financial services are affecting security
Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “Mobile Security in the Financial Services,” includes analysis …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110848/brain-hack-400x200.jpg)
How consumers view the transparency of their AI-enabled interactions
The ethical use of AI is becoming fundamental to winning people’s trust, a new study from the Capgemini Research Institute has found. As organizations progress to harness the …
![GE Aespire 7100](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093950/ge_aespire_7100-400x200.jpg)
Vulnerable GE anesthesia machines can be manipulated by attackers
A vulnerability affecting several anesthesia and respiratory devices manufactured by General Electric (GE) Healthcare could allow attackers to manipulate the devices’ …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100620/patch-400x200.jpg)
July 2019 Patch Tuesday: Microsoft plugs two actively exploited zero-days
For July 2019 Patch Tuesday, Microsoft has pushed out patches for 78 CVE-numbered vulnerabilities (15 of them critical) and Adobe for three, but none of them in its most …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094422/magnify-inspect1-400x200.jpg)
Discovering and fingerprinting BACnet devices
BACnet is a communication protocol deployed for building automation and control networks. The most widely accepted networks include Internet Protocol (BACnet/IP) and the …
![dual monitors](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09094001/dual-monitors-400x200.jpg)
The pervasive use of second screens endangers corporate IT networks
Despite techies having argued for years that having a second computer screen is a great way to improve productivity in the workplace, a new study from Gigamon has revealed …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes