Security News > 2018 > April
![The Role of AI and ML in Minimizing Alert Fatigue](/static/build/img/news/alt/breach-statistics-small.jpg)
Ted Julian of IBM Resilient Discusses Orchestration and AutomationAlert fatigue is a serious problem in terms of risk management and security analyst turnover. Ted Julian of IBM Resilient...
![Ransomware Attack Hits Ukrainian Energy Ministry, Exploiting Drupalgeddon2](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
The Ukrainian Energy Ministry has been hit by a ransomware attack – and for once it looks like this is the work of amateurs, not nation-state attackers bent on making a geopolitical point....
![Preparing for the Operational Technology Challenge](/static/build/img/news/alt/ransomware-statistic-small.jpg)
Trend Micro's Nunnikhoven Raises Concerns About Threats to OTPlenty has been said about threats to internet of things devices - and rightfully so. But what about operational technology that often...
![Bringing Visibility to the Midmarket](/static/build/img/news/alt/crypto-stat-small.jpg)
SonicWall CEO Bill Conner on Efforts to Improve Cybersecurity for SMEIncreasingly, SonicWall is focused on the midmarket, and CEO Bill Conner wants to help ensure that smaller and midsized...
![Exfiltrating private keys from air-gapped cold wallets](/static/build/img/news/alt/cost-stats-small.jpg)
Air-gapped cold wallets might be one of the safest options for keeping your cryptocurrency stash, but even they can be compromised. And, as demonstrated by security researchers from the Ben-Gurion...
![Critical infrastructure needs more 21qs6Q#S$, less P@ssw0rd, UK.gov security committee told](/static/build/img/news/alt/breach-statistics-small.jpg)
Plus: No one will say whether Huawei, ZTE are the baddies Banks could plug their security vulnerabilities by simply improving password protections, the deputy CEO of the Prudential Regulation...
![How to request your personal data under GDPR](/static/build/img/news/alt/cost-stats-small.jpg)
A subject access request will require any company to turn over data it has collected on you, and it's pretty simple to do.
![Analysis: 'Orangeworm' Attacks Appear to Involve Espionage](/static/build/img/news/alt/hackers-statistics-small.jpg)
Corporate espionage appears to be the motive behind cyberattacks targeting a variety of medical-related equipment and systems, researcher Jon DiMaggio of Symantec says in an in-depth interview...
!["Unpatchable" Nintendo Switch exploit is perfect example of the importance of firmware security](/static/build/img/news/alt/managed-security-small.jpg)
The exploit, which affects all Nvidia Tegra X1 systems, allows arbitrary code execution at the bootROM level.
![New Amazon class certifies cloud pros in securing data on AWS](/static/build/img/news/alt/cloud-cybersecurity-statistics-small.jpg)
The AWS Certified Security - Specialty Exam could help tech professionals broaden their skills on the AWS platform.