survey

Human risk factors remain outside of cybersecurity pros’ control

Human risk factors remain outside of cybersecurity pros’ control 2024-03-15 at 07:00 By Help Net Security Cyber threats are growing at an unprecedented pace, and the year ahead is fraught with cybercrime and incidents anticipated ahead of the busy election year where over 50 countries head to the polls, according to Mimecast. With new threats […]

React to this headline:

Loading spinner

Human risk factors remain outside of cybersecurity pros’ control Read More »

Only 13% of medical devices support endpoint protection agents

Only 13% of medical devices support endpoint protection agents 2024-03-14 at 07:00 By Help Net Security 63% of CISA-tracked Known Exploited Vulnerabilities (KEVs) can be found on healthcare networks, while 23% of medical devices—including imaging devices, clinical IoT devices, and surgery devices—have at least one known exploited vulnerability, according to Claroty. Traditionally, medical devices have

React to this headline:

Loading spinner

Only 13% of medical devices support endpoint protection agents Read More »

IT leaders think immutable data storage is an insurance policy against ransomware

IT leaders think immutable data storage is an insurance policy against ransomware 2024-03-14 at 06:00 By Help Net Security IT leaders consider immutable storage as a must-have in the fight against cyberattacks, according to Scality. Ransomware threats are now understood by organizations to be inevitable. Reports show 1 in 4 organizations that pay a ransom

React to this headline:

Loading spinner

IT leaders think immutable data storage is an insurance policy against ransomware Read More »

Keyloggers, spyware, and stealers dominate SMB malware detections

Keyloggers, spyware, and stealers dominate SMB malware detections 2024-03-13 at 06:06 By Help Net Security In 2023, 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data and credentials, according to Sophos. Attackers subsequently use this stolen information to gain unauthorized remote access, extort victims, deploy ransomware,

React to this headline:

Loading spinner

Keyloggers, spyware, and stealers dominate SMB malware detections Read More »

Image-based phishing tactics evolve

Image-based phishing tactics evolve 2024-03-12 at 06:00 By Help Net Security While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, according to IRONSCALES and Osterman Research. IT pros are highly aware of emerging types of phishing attacks

React to this headline:

Loading spinner

Image-based phishing tactics evolve Read More »

How new and old security threats keep persisting

How new and old security threats keep persisting 2024-03-08 at 08:00 By Help Net Security Security leaders recognize that the pattern of buying new tech and the frantic state of find-fix vulnerability management is not working, according to Cymulate. Security leaders take proactive approach to cybersecurity Rather than waiting for the next big cyberattack and

React to this headline:

Loading spinner

How new and old security threats keep persisting Read More »

Today’s biggest AI security challenges

Today’s biggest AI security challenges 2024-03-07 at 08:23 By Help Net Security 98% of companies surveyed view some of their AI models as vital for business success, and 77% have experienced breaches in their AI systems over the past year, according to HiddenLayer. The report surveyed 150 IT security and data science leaders to shed

React to this headline:

Loading spinner

Today’s biggest AI security challenges Read More »

78% of MSPs identify cybersecurity as prime IT challenge

78% of MSPs identify cybersecurity as prime IT challenge 2024-03-07 at 06:46 By Help Net Security Cybersecurity remained a top priority and an area of growth for MSPs, with 73% saying it’s a top revenue driver for their business, according to Kaseya. Ongoing cyberattack threats impact MSPs The threat of cyberattacks continues to weigh on

React to this headline:

Loading spinner

78% of MSPs identify cybersecurity as prime IT challenge Read More »

AI tools put companies at risk of data exfiltration

AI tools put companies at risk of data exfiltration 2024-03-06 at 06:03 By Help Net Security Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative AI (GenAI) only compounding the issue, indicating swift action is needed, according to Code42. Since 2021, there has been

React to this headline:

Loading spinner

AI tools put companies at risk of data exfiltration Read More »

Organizations are knowingly releasing vulnerable applications

Organizations are knowingly releasing vulnerable applications 2024-03-05 at 06:18 By Help Net Security 92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties In recent years the responsibility for application security has shifted away from dedicated

React to this headline:

Loading spinner

Organizations are knowingly releasing vulnerable applications Read More »

New compensation trends in the cybersecurity sector

New compensation trends in the cybersecurity sector 2024-03-04 at 06:31 By Help Net Security For several years, cybersecurity leaders have grappled with talent shortages in crucial cyber roles. In the face of escalating financial requirements and expanding responsibilities, these leaders are under heightened pressure to achieve more with fewer resources, creating roles encompassing multiple security

React to this headline:

Loading spinner

New compensation trends in the cybersecurity sector Read More »

Businesses foresee major impact from new SEC cybersecurity disclosure rules

Businesses foresee major impact from new SEC cybersecurity disclosure rules 2024-03-01 at 07:04 By Help Net Security While 98% of security professionals and executives have started working to comply with the new U.S. Securities and Exchange Commission (SEC) cybersecurity disclosure ruling, over one-third are still in the early phases of their efforts, according to AuditBoard.

React to this headline:

Loading spinner

Businesses foresee major impact from new SEC cybersecurity disclosure rules Read More »

Cryptojacking is no longer the sole focus of cloud attackers

Cryptojacking is no longer the sole focus of cloud attackers 2024-02-29 at 06:31 By Help Net Security As commercial adoption of cloud technologies continues, cloud-focused malware campaigns have increased in sophistication and number – a collective effort to safeguard both large and small enterprises is critical, according to Cado Security. Docker remains the most frequently

React to this headline:

Loading spinner

Cryptojacking is no longer the sole focus of cloud attackers Read More »

Vishing, smishing, and phishing attacks skyrocket 1,265% post-ChatGPT

Vishing, smishing, and phishing attacks skyrocket 1,265% post-ChatGPT 2024-02-29 at 06:02 By Help Net Security 76% of enterprises lack sufficient voice and messaging fraud protection as AI-powered vishing and smishing skyrocket following the launch of ChatGPT, according to Enea. Enterprises report significant losses from mobile fraud 61% of enterprises still suffer significant losses to mobile

React to this headline:

Loading spinner

Vishing, smishing, and phishing attacks skyrocket 1,265% post-ChatGPT Read More »

How AI is reshaping the cybersecurity job landscape

How AI is reshaping the cybersecurity job landscape 2024-02-28 at 06:32 By Help Net Security 88% of cybersecurity professionals believe that AI will significantly impact their jobs, now or in the near future, and 35% have already witnessed its effects, according to ISC2’s AI study, AI Cyber 2024. Impact of AI on cybersecurity professionals While

React to this headline:

Loading spinner

How AI is reshaping the cybersecurity job landscape Read More »

AI in cybersecurity presents a complex duality

AI in cybersecurity presents a complex duality 2024-02-28 at 06:03 By Help Net Security Companies more than ever view GRC (Governance, Risk, and Compliance) as a holistic process and are taking steps toward getting a complete view of their risk environment and compliance obligations, according to Hyperproof. Centralized GRC strategy gains momentum Centralizing strategy, unifying

React to this headline:

Loading spinner

AI in cybersecurity presents a complex duality Read More »

Enterprises’ progress in digital trust implementation is far from great

Enterprises’ progress in digital trust implementation is far from great 2024-02-27 at 06:31 By Help Net Security A growing divide separates leaders with a firm grasp on digital trust from those at the bottom of the pool, according to DigiCert. While digital trust overwhelmingly remains a critical focus for all enterprises, the latest report from

React to this headline:

Loading spinner

Enterprises’ progress in digital trust implementation is far from great Read More »

Unmanaged third-party access threatens OT environments

Unmanaged third-party access threatens OT environments 2024-02-27 at 06:01 By Help Net Security Many industrial organizations lack the resources, expertise, and collaborative processes to effectively mitigate threats and ensure secure access to operational technology (OT) systems, according to Cyolo. Ensuring secure access to OT environments is about more than just cybersecurity. These environments contain highly

React to this headline:

Loading spinner

Unmanaged third-party access threatens OT environments Read More »

2024 will be a volatile year for cybersecurity as ransomware groups evolve

2024 will be a volatile year for cybersecurity as ransomware groups evolve 2024-02-23 at 06:31 By Help Net Security Hackers have significantly increased demands for ransomware, rising over 20% year-over-year to $600,000, according to Arctic Wolf. Organizations are failing to patch their networks And there are worrying signs that 2024 will be especially volatile, as

React to this headline:

Loading spinner

2024 will be a volatile year for cybersecurity as ransomware groups evolve Read More »

92% of companies eyeing investment in AI-powered software

92% of companies eyeing investment in AI-powered software 2024-02-23 at 06:02 By Help Net Security In 2024, buyers are increasingly focused on cost efficiency, AI functionality, and enhanced security, according to Gartner. The report reveals that 61% of buyers are seeking upgrades for more functionality in their recently purchased software. The need to upgrade reflects

React to this headline:

Loading spinner

92% of companies eyeing investment in AI-powered software Read More »

Scroll to Top