survey

47% of corporate data stored in the cloud is sensitive

47% of corporate data stored in the cloud is sensitive 2024-07-05 at 07:01 By Help Net Security As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyberattacks, with SaaS applications (31%), cloud storage (30%) and cloud management infrastructure (26%) cited as the […]

React to this headline:

Loading spinner

47% of corporate data stored in the cloud is sensitive Read More »

Organizations weigh the risks and rewards of using AI

Organizations weigh the risks and rewards of using AI 2024-07-05 at 06:31 By Help Net Security 78% of organizations are tracking AI as an emerging risk while simultaneously adopting the technology themselves, according to AuditBoard. Organizations prioritize AI risk assessment The report, based on a survey of over 400 security professionals in the US involved

React to this headline:

Loading spinner

Organizations weigh the risks and rewards of using AI Read More »

Organizations use outdated approaches to secure APIs

Organizations use outdated approaches to secure APIs 2024-07-04 at 06:31 By Help Net Security Security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites, according to Cloudflare. The report underscores that the volume of threats stemming from issues in

React to this headline:

Loading spinner

Organizations use outdated approaches to secure APIs Read More »

Only 13% of organizations are cyber mature

Only 13% of organizations are cyber mature 2024-07-04 at 06:01 By Help Net Security A staggering 83% of organizations have suffered a material security breach recently, with over half occurring in the past year alone, underscoring the critical need for advanced preparedness and agile response strategies, according to Commvault. For security and IT professionals, the

React to this headline:

Loading spinner

Only 13% of organizations are cyber mature Read More »

Companies spend more on cybersecurity but struggle to track expenses

Companies spend more on cybersecurity but struggle to track expenses 2024-07-03 at 06:01 By Help Net Security Most companies do not know how effectively they are investing money to fight the cybersecurity threat, according to Optiv. Cybersecurity budgets are increasing and cyber incidents are rampant, and yet only a small percentage of respondents have a

React to this headline:

Loading spinner

Companies spend more on cybersecurity but struggle to track expenses Read More »

Deepfakes and voice clones are undermining election integrity

Deepfakes and voice clones are undermining election integrity 2024-07-02 at 06:02 By Help Net Security As the volume of digital business rises year over year, the potential for AI-enhanced digital fraud increases with it, according to TeleSign. A new TeleSign report highlights consumer concerns and uncertainty about how AI is being deployed, particularly regarding digital

React to this headline:

Loading spinner

Deepfakes and voice clones are undermining election integrity Read More »

CISOs becoming more comfortable with risk levels

CISOs becoming more comfortable with risk levels 2024-06-28 at 07:31 By Help Net Security Shifts in the cyber threats landscape have changed the way today’s CISOs evaluate their business’s risk appetite, according to Netskope. CISO risk appetite levels Specifically, 92% of CISOs report that these changes are creating tensions with their CEO and other members

React to this headline:

Loading spinner

CISOs becoming more comfortable with risk levels Read More »

Web scraping is not just a security or fraud problem

Web scraping is not just a security or fraud problem 2024-06-28 at 06:31 By Help Net Security Bots compose 42% of overall web traffic, and 65% of these bots are malicious, according to Akamai. Negative effects of scraper bots on business operations Web scraping is not just a fraud or security problem, it is also

React to this headline:

Loading spinner

Web scraping is not just a security or fraud problem Read More »

New ransomware, infostealers pose growing risk in 2024

New ransomware, infostealers pose growing risk in 2024 2024-06-27 at 07:01 By Help Net Security BlackBerry detected and stopped 3.1 million cyberattacks (37,000 per day) in the first quarter of 2024. Between January and March 2024, BlackBerry detected 630,000 malicious hashes, representing a 40% increase from its previous reporting period. 60% of attacks targeting industry

React to this headline:

Loading spinner

New ransomware, infostealers pose growing risk in 2024 Read More »

75% of new vulnerabilities exploited within 19 days

75% of new vulnerabilities exploited within 19 days 2024-06-27 at 06:31 By Help Net Security Last year alone, over 30,000 new vulnerabilities were published, with a new vulnerability emerging approximately every 17 minutes — averaging 600 new vulnerabilities per week, according to Skybox Security. The report highlights a critical gap in remediation efforts, with the

React to this headline:

Loading spinner

75% of new vulnerabilities exploited within 19 days Read More »

B+ security rating masks healthcare supply chain risks

B+ security rating masks healthcare supply chain risks 2024-06-26 at 06:01 By Help Net Security While the healthcare sector gets a “B+” security rating for the first half of 2024, it faces a critical vulnerability: supply chain cyber risk, according to SecurityScorecard. The US healthcare industry’s security ratings were better than expected, with an average

React to this headline:

Loading spinner

B+ security rating masks healthcare supply chain risks Read More »

1 out of 3 breaches go undetected

1 out of 3 breaches go undetected 2024-06-24 at 06:31 By Help Net Security Organizations continue to struggle in detecting breaches as they become more targeted and sophisticated, with more than 1 out of 3 organizations citing their existing security tools were unable to detect breaches when they occur, according to Gigamon. As hybrid cloud

React to this headline:

Loading spinner

1 out of 3 breaches go undetected Read More »

Pressure mounts on CISOs as SEC bares teeth with legal action

Pressure mounts on CISOs as SEC bares teeth with legal action 2024-06-21 at 06:31 By Help Net Security A Panaseer investigation into organizations’ annual 10-K filings reported to the SEC shows that from January-May 2024, at least 1,327 filings mentioned NIST – a key indicator that cybersecurity posture is present in a filing. This compares

React to this headline:

Loading spinner

Pressure mounts on CISOs as SEC bares teeth with legal action Read More »

Improving OT cybersecurity remains a work in progress

Improving OT cybersecurity remains a work in progress 2024-06-20 at 06:31 By Help Net Security Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still critical areas for improvement as IT and OT network environments continue to converge, according to Fortinet. Cyberattacks that compromise OT

React to this headline:

Loading spinner

Improving OT cybersecurity remains a work in progress Read More »

Most cybersecurity pros took time off due to mental health issues

Most cybersecurity pros took time off due to mental health issues 2024-06-20 at 06:01 By Help Net Security Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick leave – costing US enterprises almost $626 million in lost productivity every year, according to Hack The

React to this headline:

Loading spinner

Most cybersecurity pros took time off due to mental health issues Read More »

Find out which cybersecurity threats organizations fear the most

Find out which cybersecurity threats organizations fear the most 2024-06-19 at 06:31 By Help Net Security This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance isn’t the answer for ransom payments Veeam | 2024 Ransomware Trends Report | June 2024 Ransomware remains

React to this headline:

Loading spinner

Find out which cybersecurity threats organizations fear the most Read More »

Rising exploitation in enterprise software: Key trends for CISOs

Rising exploitation in enterprise software: Key trends for CISOs 2024-06-19 at 06:01 By Help Net Security Action1 researchers found an alarming increase in the total number of vulnerabilities across all enterprise software categories. “With the NVD’s delay in associating Common Vulnerabilities and Exposures (CVE) identifiers with CPE (Common Platform Enumeration) data, our report comes at

React to this headline:

Loading spinner

Rising exploitation in enterprise software: Key trends for CISOs Read More »

Mass exploitation is the new primary attack vector for ransomware

Mass exploitation is the new primary attack vector for ransomware 2024-06-18 at 07:01 By Help Net Security The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV vulnerability trends 64% of all edge service and infrastructure Common Vulnerabilities and Exposures (CVEs) in the Known Exploited

React to this headline:

Loading spinner

Mass exploitation is the new primary attack vector for ransomware Read More »

42% plan to use API security for AI data protection

42% plan to use API security for AI data protection 2024-06-18 at 06:01 By Help Net Security While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices, according to F5. Data and the systems companies put in place to obtain, store, and secure it are

React to this headline:

Loading spinner

42% plan to use API security for AI data protection Read More »

Malicious emails trick consumers into false election contributions

Malicious emails trick consumers into false election contributions 2024-06-17 at 06:32 By Help Net Security Major regional and global events – such as military exercises, political or economic summits, political conventions, and elections – drove cyber threat activities, according to Trellix. “The last six months have been unprecedented – a state of polycrisis remains and

React to this headline:

Loading spinner

Malicious emails trick consumers into false election contributions Read More »

Scroll to Top