![up](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102706/up-400x200.jpg)
Nearly half of businesses suffered an unrecoverable data event in the last three years
Over 90% of respondents do not consider their organization to be IT resilient and nearly half have suffered an unrecoverable data event in the last three years, according to …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100449/email_security2-400x200.jpg)
6.4 billion fake emails sent every day
The Valimail Q2 2018 Email Fraud Landscape shows that fake email continues to be a serious problem, with an estimated 6.4 billion fake emails sent every day. That total …
![Wemo](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100334/wemo-400x200.jpg)
Hacking smart plugs to enter business networks
McAfee researchers have discovered a buffer overflow flaw in Belkin’s Wemo Insight Smart Plug that can be exploited by attackers to access and interfere with other …
![match](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111901/match-400x200.jpg)
Critical Apache Struts flaw opens enterprises to compromise, patch ASAP!
A critical remote code execution vulnerability (CVE-2018-11776) in Apache Struts, the popular open source framework for developing Java-based web apps, could allow remote …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112829/money-laptop-400x200.jpg)
Global information security spending to exceed $124 billion in 2019
Worldwide spending on information security products and services will reach more than $114 billion in 2018, an increase of 12.4 percent from last year, according to the latest …
![door](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100342/door-400x200.jpg)
Who owns application security?
In July 2018, F5 released its first annual Application Protection Report. As part of the report, F5 commissioned Ponemon to survey of 3,135 IT security practitioners across …
![web](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110813/web-400x200.jpg)
Data from 316 million real-world attacks in AWS and Azure environments
In evaluating 316 million incidents, tCell found it clear that attacks against the application are growing in volume and sophistication, and as such, continue to be a major …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100340/users-400x200.jpg)
The single sign-on account hijacking threat and what can we do about it?
Single sign-on (SSO) lets users avoid creating and managing accounts across different services, but what happens when that main, identity-providing account gets compromised? …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104924/building-400x200.jpg)
IoT security: The work on raising the bar continues
One of the main goals of Chief Information Security Officers should be to help the organization succeed, and they are unlikely to do that by denying their organization the …
![WhiteSource Web Advisor](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100352/whitesource-wa-400x200.jpg)
Secure your open source components automatically, continuously, and silently
In this podcast recorded at Black Hat USA 2018, Azi Cohen, General Manager at WhiteSource, talks about open source lifecycle management. WhiteSource manages open source …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103906/lock-400x200.jpg)
Security of smart utilities leaves a lot to be desired
The modernization of utility infrastructures is enabling increased efficiencies and reliability through digitization, connectivity, and IT-based approaches. Smart cyber assets …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102449/puzzle-400x200.jpg)
Companies reliant on consumer data are at risk
Companies with business models reliant on the increasing quantity and scope of consumer data are at risk if public ambivalence about data privacy turns to opposition, …
Featured news
Resources
Don't miss
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)
- Arvest Bank CISO on building a strong cybersecurity culture in banking
- Review: Inside Cyber Warfare, 3rd Edition
- How to detect and disable Apple AirTags that might be tracking you