![EU](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100613/EU-lock2-400x200.jpg)
GDPR-ready organizations see lowest incidence of data breaches
Organizations worldwide that invested in maturing their data privacy practices are now realizing tangible business benefits from these investments, according to Cisco’s …
![research](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110743/research-400x200.jpg)
New infosec products of the week: January 25, 2019
Threat Stack announces new API for streamlined DevOps and security workflows The new API will allow for the suppression and dismissal of alerts from existing tools, …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101419/danger-400x200.jpg)
83% of global respondents experienced phishing attacks in 2018
Proofpoint analyzed data from tens of millions of simulated phishing attacks sent over a one-year period, along with nearly 15,000 cybersecurity professional survey responses, …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
The most effective security strategies to guard sensitive information
Today’s enterprise IT infrastructures are not largely hosted in the public cloud, nor are they SaaS-based, with security being the single largest barrier when it comes to …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101159/arrows-400x200.jpg)
Enterprises turn to MSPs to mitigate huge skills gap concerns
A huge skills gap coupled with security worries is driving IT decision makers to engage Managed Service Providers (MSPs) to handle their IT needs, according to NTT Com. Of the …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095734/danger-400x200.jpg)
PHP PEAR supply chain attack: Backdoor added to installer
Some additional details have emerged about the recent security breach involving the PHP PEAR (PHP Extension and Application Repository) webserver, but much is still unknown. …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110832/cisco-400x200.jpg)
Cisco fixes security holes in SD-WAN, Webex, Small Business routers
Cisco has fixed a heap of security holes in a variety of its products, including a critical one affecting its SD-WAN Solution. Cisco SD-WAN vulnerabilities The most critical …
![servers](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100835/servers-400x200.jpg)
Organizations waste money storing useless IT hardware
A survey of 600 data center experts from APAC, Europe and North America reveals that two in five organizations that store their data in-house spend more than $100,000 storing …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095805/connection-400x200.jpg)
Branching out more efficiently and securely with SD-WAN
As enterprises expand, through organic growth or acquisition, they need to support the IT needs of more distributed locations. These often include teams in shared office …
![dollar](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112427/dollar-400x200.jpg)
Reimagining risk management to mitigate looming economic dangers
In a volatile market environment and with the edict to “do more with less,” many financial institutions are beginning efforts to reengineer their risk management …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102741/phishing-400x200.jpg)
Microsoft remains the most impersonated brand, Netflix phishing spikes
Although Microsoft remains the top target for phishers, Netflix saw an incredible surge in Dec., making it the second most impersonated brand in Q4 2018, according to Vade …
![Globe](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113112/hand-globe-400x200.jpg)
Cyberattacks fueled by geopolitical tension are increasing
Billions of personal records were stolen in 2018, unearthed in breaches that successfully targeted household names in government, technology, healthcare, travel and …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations