report

Top 10 strategic technology trends shaping the future of business

Top 10 strategic technology trends shaping the future of business 2024-10-28 at 06:03 By Help Net Security The ethical and responsible use of technology is fast becoming part of the mandate for CIOs, as organizations balance the need for progress with the protection of stakeholders’ trust and well-being, according to Gartner. “This year’s top strategic […]

React to this headline:

Loading spinner

Top 10 strategic technology trends shaping the future of business Read More »

Unclear pricing for GRC tools creates market confusion

Unclear pricing for GRC tools creates market confusion 2024-10-25 at 06:33 By Help Net Security Due to widely varying government, risk, and compliance (GRC) tool pricing, enterprise risk management (ERM) leaders must understand four different pricing-tier categories of GRC solutions and apply a scoping framework to further estimate likely costs ahead of vendor selection, according

React to this headline:

Loading spinner

Unclear pricing for GRC tools creates market confusion Read More »

AI and deepfakes fuel phishing scams, making detection harder

AI and deepfakes fuel phishing scams, making detection harder 2024-10-24 at 06:03 By Help Net Security AI impersonation is now the hardest vector for cybersecurity professionals to protect companies against, according to Teleport. The study, which surveyed 250 senior US and UK decision-makers, shows that social engineering remains one of the top tactics cybercriminals use

React to this headline:

Loading spinner

AI and deepfakes fuel phishing scams, making detection harder Read More »

Most women in IT work overtime to advance in their careers

Most women in IT work overtime to advance in their careers 2024-10-23 at 06:03 By Help Net Security As a historically male-dominated industry, many IT companies have been described as having limited career development opportunities for female employees, according to Acronis. Issues like lack of mentorship, inadequate policies for work-life balance, and sometimes even a

React to this headline:

Loading spinner

Most women in IT work overtime to advance in their careers Read More »

Phishing scams and malicious domains take center stage as the US election approaches

Phishing scams and malicious domains take center stage as the US election approaches 2024-10-22 at 07:03 By Help Net Security Phishing scams aimed at voters, malicious domain registrations impersonating candidates, and other threat activity designed to exploit unassuming victims take center stage as the US election approaches, according to Fortinet. “As the 2024 US presidential

React to this headline:

Loading spinner

Phishing scams and malicious domains take center stage as the US election approaches Read More »

Hackers are finding new ways to leverage AI

Hackers are finding new ways to leverage AI 2024-10-22 at 06:20 By Help Net Security AI adoption and integration has continued its rapid momentum within the hacking community, according to Bugcrowd. Nevertheless, it continues to pose both benefits and unfortunate cyber risks. This year’s report revealed a significant shift in the perceived value of AI

React to this headline:

Loading spinner

Hackers are finding new ways to leverage AI Read More »

Should the CISOs role be split into two functions?

Should the CISOs role be split into two functions? 2024-10-21 at 06:01 By Help Net Security 84% of CISOs believe the role needs to be split into two functions – one technical and one business-focused, to maximize security and organizational resilience, according to Trellix. Regulatory demands pose a growing challenge for CISOs The research reveals

React to this headline:

Loading spinner

Should the CISOs role be split into two functions? Read More »

Despite massive security spending, 44% of CISOs fail to detect breaches

Despite massive security spending, 44% of CISOs fail to detect breaches 2024-10-18 at 07:31 By Help Net Security Despite global information security spending projected to reach $215 billion in 2024, 44% of CISOs surveyed reported they were unable to detect a data breach in the last 12 months using existing security tools, according to Gigamon.

React to this headline:

Loading spinner

Despite massive security spending, 44% of CISOs fail to detect breaches Read More »

Why companies are struggling to keep up with SaaS data protection

Why companies are struggling to keep up with SaaS data protection 2024-10-17 at 06:01 By Help Net Security While businesses increasingly rely on SaaS tools, many leaders are not fully confident in their ability to safeguard their data, according to Keepit. Growing concerns over SaaS data protection According to the survey, while 28% of respondents

React to this headline:

Loading spinner

Why companies are struggling to keep up with SaaS data protection Read More »

Defenders must adapt to shrinking exploitation timelines

Defenders must adapt to shrinking exploitation timelines 2024-10-16 at 15:16 By Zeljka Zorz A new report from Mandiant reveals that the average time-to-exploit vulnerabilities before or after a patch is released has plunged to just five days in 2023, down from 32 days in 2021 in 2022. One reason for this is the fact that,

React to this headline:

Loading spinner

Defenders must adapt to shrinking exploitation timelines Read More »

Unlocking the value of AI-powered identity security

Unlocking the value of AI-powered identity security 2024-10-16 at 06:01 By Help Net Security While most organizations are still in the early horizons of their identity security journey, those who achieve maturity are seeing disproportionately higher returns for every dollar spent​, according to SailPoint. Identity security adoption still in early stages The value of identity

React to this headline:

Loading spinner

Unlocking the value of AI-powered identity security Read More »

Data breaches trigger increase in cyber insurance claims

Data breaches trigger increase in cyber insurance claims 2024-10-15 at 06:31 By Help Net Security Cyber claims have continued their upwards trend over the past year, driven in large part by a rise in data and privacy breach incidents, according to Allianz. Cyber claims frequency exceeds €1 million The frequency of large cyber claims (>€1

React to this headline:

Loading spinner

Data breaches trigger increase in cyber insurance claims Read More »

CIOs want a platform that combines AI, networking, and security

CIOs want a platform that combines AI, networking, and security 2024-10-14 at 06:38 By Help Net Security While AI has captured the attention of the technology industry, the majority of CIOs and senior IT leaders are primarily focused on the convergence of networking and security, according to Extreme Networks. The survey, fielded in July and

React to this headline:

Loading spinner

CIOs want a platform that combines AI, networking, and security Read More »

CISSP and CompTIA Security+ lead as most desired security credentials

CISSP and CompTIA Security+ lead as most desired security credentials 2024-10-14 at 06:38 By Help Net Security 33.9% of tech professionals report a shortage of AI security skills, particularly around emerging vulnerabilities like prompt injection, according to O’Reilly. This highlights the need for specialized training as AI adoption continues to accelerate across industries. Critical skills

React to this headline:

Loading spinner

CISSP and CompTIA Security+ lead as most desired security credentials Read More »

Data loss incidents impact patient care

Data loss incidents impact patient care 2024-10-11 at 08:31 By Help Net Security 92% of healthcare organizations experienced at least one cyber attack in the past 12 months, an increase from 88% in 2023, with 69% reporting disruption to patient care as a result, according to Proofpoint. Healthcare organizations struggle to mitigate risks from cyberattacks

React to this headline:

Loading spinner

Data loss incidents impact patient care Read More »

Consumers have trust issues regarding how AI collects their data

Consumers have trust issues regarding how AI collects their data 2024-10-10 at 06:31 By Help Net Security Consumers worldwide are highly concerned about the information companies collect from them – especially when it’s used for AI, according to Cohesity. The majority of respondents (73% in the UK, 81% in the US and 82% in Australia)

React to this headline:

Loading spinner

Consumers have trust issues regarding how AI collects their data Read More »

30% of customer-facing APIs are completely unprotected

30% of customer-facing APIs are completely unprotected 2024-10-09 at 06:34 By Help Net Security 70% of customer-facing APIs are secured using HTTPS, leaving nearly one-third of these APIs completely unprotected, according to F5. This is a stark contrast to the 90% of web pages that are now accessed via HTTPS, following the push for secure

React to this headline:

Loading spinner

30% of customer-facing APIs are completely unprotected Read More »

Websites are losing the fight against bot attacks

Websites are losing the fight against bot attacks 2024-10-08 at 06:01 By Help Net Security The discovery that 95% of advanced bot attacks go undetected points to a weakness in current detection and mitigation strategies. This suggests that while some organizations may have basic defenses, they are ill-equipped to handle more sophisticated attacks, such as

React to this headline:

Loading spinner

Websites are losing the fight against bot attacks Read More »

SOC teams are frustrated with their security tools

SOC teams are frustrated with their security tools 2024-10-07 at 06:31 By Help Net Security Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal, according to Vectra AI. They cite a growing distrust in

React to this headline:

Loading spinner

SOC teams are frustrated with their security tools Read More »

Cybercriminals capitalize on poorly configured cloud environments

Cybercriminals capitalize on poorly configured cloud environments 2024-10-04 at 06:31 By Help Net Security Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are utilizing off-the-shelf tools Offensive security tools (OSTs), including Cobalt Strike and Metasploit, made up ~54% of observed malware alerts. The most

React to this headline:

Loading spinner

Cybercriminals capitalize on poorly configured cloud environments Read More »

Scroll to Top