![danger](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101419/danger-400x200.jpg)
Fewer records breached: Cybercriminals focus on ransomware, destructive attacks
According to the 2018 IBM X-Force Threat Intelligence Index, the number of records breached dropped nearly 25 percent in 2017, as cybercriminals shifted their focus on …
![RSA Conference](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101416/rsac-attendees-400x200.jpg)
What’s new at RSAC 2018?
With the most significant global information security event just around the corner, we caught up with Sandra Toms, VP and Curator, RSA Conference, to find out what attendees …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105528/industry-1-400x200.jpg)
How critical infrastructure operators rate their security controls
Indegy revealed that nearly 60 percent of executives at critical infrastructure operators polled in a recent survey said they lack appropriate controls to protect their …
![Intel inside](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102254/intel-inside-fire-400x200.jpg)
Intel will not provide Spectre/Meltdown microcode updates for some processor families
Intel has decided not to provide microcode updates to plug Spectre and Meltdown vulnerabilities in a number of older processors. According to the last update (April 2, 2018) …
![Cisco switch](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104427/Cisco-switches-400x200.jpg)
Critical vulnerability opens Cisco switches to remote attack
A critical vulnerability affecting many of Cisco’s networking devices could be exploited by unauthenticated, remote attackers to take over vulnerable devices or trigger …
![Idea](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101427/idea-400x200.jpg)
Would automation lead to improved cybersecurity?
Concerted efforts to increase job satisfaction, automation in the Security Operations Center (SOC) and gamification in the workplace are key to beating cybercriminals at their …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112722/tunnel-400x200.jpg)
How companies continue to expose sensitive data to threats
A new study from the Varonis Data Lab found that on average, 21% of a company’s folders were accessible to every employee, and 41% of companies had at least 1,000 sensitive …
![Blocks](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101432/blocks-400x200.jpg)
Industry leaders struggle to balance digital innovation and security
Companies are struggling with the tug-of-war between advancing digital innovation and ensuring secure digital experiences that maintain user trust and mitigate risk. As part …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105123/person-400x200.jpg)
How safe is your personal information?
Another day, another data breach. Recent news about cybercriminals obtaining more than 5 million credit card numbers from high-end U.S. retailers joined a series of major …
![Cloudflare](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101430/1111-400x200.jpg)
Cloudflare launches privacy-protecting DNS service
If you’ve been offline during the weekend you might have missed Cloudflare announcing a new privacy-oriented consumer DNS service, hosted at the following IP addresses: …
![Patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101437/patch-400x200.jpg)
How to close the security update gap
Security patching is hard and patch fatigue is real. So what can be done to make the process more simple, less disruptive, and more likely to be performed in a timely manner? …
![Pen Test Metrics 2018](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101435/pen_test_metrics_2018-400x200.jpg)
Report: What two years of real pen testing findings will tell you
The information included in this report (Time to Fix, Vulnerability Types, Findings Criticality, Issues Fixed) is summary data from all of the penetration tests Cobalt …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage