Read more about survey
Bookmark and Share
  • One in three top Alexa websites is risky

    25.03.2015

    Based on an analysis of the Alexa top one million sites, Menlo Security found that more than one in three of the top domains are either already compromised or running vulnerable software.

  • Organizations have little control over privileged access

    25.03.2015

    Even though nearly half of IT decision makers admit they have employees with access rights not necessary to their current role, more than one out of four companies indicated they have no controls in place to manage privileged access.

  • The average DDoS attack tripled in volume

    24.03.2015

    The average packet volume for DDoS attacks increased 340 percent to 4.36 million packets per second (Mpps), and the average bit volume swelled 245 percent to 12.1 Gbps in the final quarter of 2014, according to Black Lotus.

  • UK consumers committed to mobile privacy

    24.03.2015

    Spurred by high-profile data breaches, Edward Snowden's revelations, and by the growing awareness that their smartphones hold a lot of sensitive data, most UK users have become more careful about protecting their personal privacy, and consider the privacy of their mobile data to be in their own hands.

  • Sensitive data resides in the cloud

    24.03.2015

    With the vast majority of enterprises now making use of cloud environments, 54 percent globally reported keeping sensitive information within the cloud, according to Vormetric.




Spotlight

How security pros deal with cybercrime extortion

1 in 3 security professionals recommend negotiating with cybercriminals for the return of stolen data or the restoration of encrypted files. 86% of security professionals believed their peers at other organizations have brokered deals with cybercriminals.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Apr 1st
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //