survey

Average global data breach cost now $4.44 million

Average global data breach cost now $4.44 million 2025-08-04 at 08:37 By Anamarija Pogorelec IBM released its Cost of a Data Breach Report, which revealed AI adoption is greatly outpacing AI security and governance. While the overall number of organizations experiencing an AI-related breach is a small representation of the researched population, this is the […]

React to this headline:

Loading spinner

Average global data breach cost now $4.44 million Read More »

The surprising truth about identity security confidence

The surprising truth about identity security confidence 2025-08-04 at 07:42 By Help Net Security Organizations most confident in their identity security are often the least prepared, according to a new report from BeyondID. The study reveals a troubling gap between what organizations believe about their identity security programs and how they actually behave. Surprisingly, those

React to this headline:

Loading spinner

The surprising truth about identity security confidence Read More »

AI is changing the vCISO game

AI is changing the vCISO game 2025-07-31 at 08:02 By Anamarija Pogorelec Virtual CISO (vCISO) services have moved from niche to mainstream, with vCISO services adoption 2025 data showing a more than threefold increase in just one year. According to Cynomi’s 2025 State of the Virtual CISO report, 67% of MSPs and MSSPs now offer

React to this headline:

Loading spinner

AI is changing the vCISO game Read More »

Why rural hospitals are losing the cybersecurity battle

Why rural hospitals are losing the cybersecurity battle 2025-07-31 at 07:04 By Anamarija Pogorelec Cyber threats are becoming more frequent and sophisticated, and rural hospitals and clinics are feeling the pressure from all sides: tight budgets, small teams, limited training, complex technology, and vendors that do not always offer much help. Often, they are left

React to this headline:

Loading spinner

Why rural hospitals are losing the cybersecurity battle Read More »

Why CISOs should rethink identity risk through attack paths

Why CISOs should rethink identity risk through attack paths 2025-07-30 at 08:00 By Sinisa Markovic Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report from SpecterOps makes the case that traditional tools like identity governance, PAM, and MFA

React to this headline:

Loading spinner

Why CISOs should rethink identity risk through attack paths Read More »

AI is here, security still isn’t

AI is here, security still isn’t 2025-07-30 at 07:30 By Sinisa Markovic Although 79% of organizations are already running AI in production, only 6% have put in place a comprehensive security strategy designed specifically for AI. As a result, most enterprises remain exposed to threats they are not yet prepared to detect or respond to,

React to this headline:

Loading spinner

AI is here, security still isn’t Read More »

Inside the application security crisis no one wants to talk about

Inside the application security crisis no one wants to talk about 2025-07-29 at 07:50 By Anamarija Pogorelec Despite knowing the risks, most organizations are still shipping insecure software. That’s one of the stark findings from Cypress Data Defense’s 2025 State of Application Security report, which reveals a worsening crisis in software security. According to the

React to this headline:

Loading spinner

Inside the application security crisis no one wants to talk about Read More »

Enterprise printer security fails at every stage

Enterprise printer security fails at every stage 2025-07-22 at 10:13 By Help Net Security Printer platform security is often overlooked in enterprise security strategies, creating security gaps, according to HP Wolf Security. By addressing security at every stage, organizations can strengthen their defenses and ensure their print infrastructure remains a trusted part of their IT

React to this headline:

Loading spinner

Enterprise printer security fails at every stage Read More »

As AI tools take hold in cybersecurity, entry-level jobs could shrink

As AI tools take hold in cybersecurity, entry-level jobs could shrink 2025-07-22 at 10:13 By Sinisa Markovic A new survey from ISC2 shows that nearly a third of cybersecurity professionals are already using AI security tools, and many others are close behind. So far, 30 percent of professionals say they’ve already integrated AI into their

React to this headline:

Loading spinner

As AI tools take hold in cybersecurity, entry-level jobs could shrink Read More »

Are your employees using Chinese GenAI tools at work?

Are your employees using Chinese GenAI tools at work? 2025-07-21 at 07:35 By Anamarija Pogorelec Nearly one in 12 employees are using Chinese-developed generative AI tools at work, and they’re exposing sensitive data in the process. That’s according to new research from Harmonic Security, which analyzed the behavior of roughly 14,000 end users in the

React to this headline:

Loading spinner

Are your employees using Chinese GenAI tools at work? Read More »

AI adoption is booming but secure scaling not so much

AI adoption is booming but secure scaling not so much 2025-07-18 at 09:35 By Help Net Security 96% of organizations are deploying AI models, and virtually no organization can move into the future without considering how ML and intelligent apps might soon affect its operations, according to F5. Only 2% of global organizations are highly

React to this headline:

Loading spinner

AI adoption is booming but secure scaling not so much Read More »

What Fortune 100s are getting wrong about cybersecurity hiring

What Fortune 100s are getting wrong about cybersecurity hiring 2025-07-17 at 07:42 By Sinisa Markovic Many companies say they can’t find enough cybersecurity professionals. But a new report suggests the real problem isn’t a lack of talent, but how those jobs are structured and advertised. Expel’s 2025 Enterprise Cybersecurity Talent Index looked at more than

React to this headline:

Loading spinner

What Fortune 100s are getting wrong about cybersecurity hiring Read More »

Most cybersecurity risk comes from just 10% of employees

Most cybersecurity risk comes from just 10% of employees 2025-07-16 at 07:46 By Anamarija Pogorelec A new report from Living Security and the Cyentia Institute sheds light on the real human element behind cybersecurity threats, and it’s not what most organizations expect. The Risky Business: Who Protects & Who Puts You at Risk report analyzes

React to this headline:

Loading spinner

Most cybersecurity risk comes from just 10% of employees Read More »

Why your Microsoft 365 setup might be more vulnerable than you think

Why your Microsoft 365 setup might be more vulnerable than you think 2025-07-14 at 08:15 By Help Net Security 60% of organizations rate their Microsoft 365 security as “established” or “advanced”, according to CoreView. Yet, 60% of those same organizations have experienced account compromise attacks. The Microsoft 365 attack surface is wide and unpredictable. Risks

React to this headline:

Loading spinner

Why your Microsoft 365 setup might be more vulnerable than you think Read More »

Ransomware drops, but don’t relax yet

Ransomware drops, but don’t relax yet 2025-07-14 at 07:44 By Help Net Security WatchGuard has released its latest Internet Security Report, covering malware, network, and endpoint threats spotted by its Threat Lab in the first quarter of 2025. The report shows a 171% jump in unique malware detections compared to the previous quarter, the highest

React to this headline:

Loading spinner

Ransomware drops, but don’t relax yet Read More »

Behind the code: How developers work in 2025

Behind the code: How developers work in 2025 2025-07-11 at 13:01 By Anamarija Pogorelec How are developers working in 2025? Docker surveyed over 4,500 people to find out, and the answers are a mix of progress and ongoing pain points. AI is gaining ground but still unevenly used. Security is now baked into everyday workflows.

React to this headline:

Loading spinner

Behind the code: How developers work in 2025 Read More »

Employees are quietly bringing AI to work and leaving security behind

Employees are quietly bringing AI to work and leaving security behind 2025-07-11 at 08:06 By Help Net Security While IT departments race to implement AI governance frameworks, many employees have already opened a backdoor for AI, according to ManageEngine. The rise of unauthorized AI use Shadow AI has quietly infiltrated organizations across North America, creating

React to this headline:

Loading spinner

Employees are quietly bringing AI to work and leaving security behind Read More »

CISOs urged to fix API risk before regulation forces their hand

CISOs urged to fix API risk before regulation forces their hand 2025-07-08 at 07:33 By Mirko Zorz Most organizations are exposing sensitive data through APIs without security controls in place, and they may not even realize it, according to Raidiam. Their report, API Security at a Turning Point, draws on a detailed assessment of 68

React to this headline:

Loading spinner

CISOs urged to fix API risk before regulation forces their hand Read More »

Most AI and SaaS apps are outside IT’s control

Most AI and SaaS apps are outside IT’s control 2025-06-26 at 07:08 By Help Net Security 60% of enterprise SaaS and AI applications operate outside IT’s visibility, according to CloudEagle.ai. This surge in invisible IT is fueling a crisis in AI identity governance, leading to increased breaches, audit failures, and compliance risk across enterprises. A

React to this headline:

Loading spinner

Most AI and SaaS apps are outside IT’s control Read More »

Medical device cyberattacks push hospitals into crisis mode

Medical device cyberattacks push hospitals into crisis mode 2025-06-23 at 07:14 By Help Net Security 22% of healthcare organizations have experienced cyberattacks that directly impacted medical devices, according to RunSafe Security. Three-quarters of these incidents disrupted patient care, including 24% that required patient transfers to other facilities. The survey reveals that healthcare cybersecurity has evolved

React to this headline:

Loading spinner

Medical device cyberattacks push hospitals into crisis mode Read More »

Scroll to Top