![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101847/puzzle-400x200.jpg)
Illumio and Qualys integrate to deliver vulnerability-based micro-segmentation
Illumio announced new global vulnerability mapping capabilities on its Adaptive Security Platform. Vulnerability and threat data from the Qualys Cloud Platform is integrated …
![AMD](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101553/amd-400x200.jpg)
AMD users running Windows 10 get their Spectre fix
AMD has released new microcode updates for mitigating variant 2 of the Spectre attack and Microsoft has released an OS update with the mitigation to AMD users running Windows …
![Coins](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101442/coins-400x200.jpg)
2.5 billion crypto mining attempts detected in enterprise networks
The volume of cryptomining transactions has been steadily growing since Coinhive came out with its browser-based cryptomining service in September 2017. Some websites have …
![stock price](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104355/stock_price-400x200.jpeg)
Key obstacles in enterprise security budgeting
IANS released its latest findings on budget-related best practices for information security leaders to consistently command the budget and resources they need. “It’s part of …
![burn](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110748/burn-400x200.jpg)
2.6 billion records were stolen, lost or exposed worldwide in 2017
Gemalto released the latest findings of the Breach Level Index, revealing that 2.6 billion records were stolen, lost or exposed worldwide in 2017, an 88% increase from 2016. …
![GDPR](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104457/gdpr-400x200.jpg)
Many businesses struggling to meet GDPR deadline
IT decision makers across the U.S., UK, France, and Germany are still missing an opportunity to transform their business through a holistic data management approach that …
![Capsule8](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101349/capsule8-400x200.jpg)
Capsule8 introduces Linux workload attack detection platform
Capsule8 announced the general availability of Capsule8 1.0, a real-time, zero-day attack detection platform capable of scaling to massive production deployments. As …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103441/qualys-400x200.jpg)
Qualys at RSA Conference 2018: Best practices presentations from industry leaders
There will be no lack of interesting content from Qualys at this year’s RSA Conference. Depending on you interests, you might want to make time for some of these talks and …
![Fortanix](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101359/fortanix-400x200.jpg)
Fortanix presenting on protecting containerized apps with runtime encryption at RSAC 2018
Fortanix has been selected to present in the session Protecting Containers from Host-Level Attacks at RSA Conference 2018 next week. CEO and Co-Founder Ambuj Kumar will join …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101346/patch-1-400x200.jpg)
What patches to prioritize following the April 2018 Patch Tuesday?
Patch Tuesday came and went and, as usual, Microsoft and Adobe have released patches/security updates for vulnerabilities affecting a wide variety of their products. …
![ThreatQ Investigations](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101351/ThreatQ-Investigations-400x200.png)
ThreatQ Investigations: Cybersecurity situation room accelerates security operations
ThreatQuotient launched ThreatQ Investigations, a cybersecurity situation room designed for collaborative threat analysis, shared understanding and coordinated response. …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113318/danger-400x200.jpg)
How security researchers deal with risks stemming from their activities
Broad and inconsistent interpretations of behind the times laws, new anti-infosec legislation, lawsuits and criminal prosecutions are having a chilling effect on security …
Featured news
Resources
Don't miss
- It’s time to secure the extended digital supply chain
- SysReptor: Open-source penetration testing reporting platform
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)
- 8Base ransomware group leaders arrested, leak site seized
- Apple fixes zero-day flaw exploited in “extremely sophisticated” attack (CVE-2025-24200)