survey

Baseline standards for BYOD access requirements

Baseline standards for BYOD access requirements 07/09/2023 at 06:02 By Help Net Security 49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources, according to a Jamf survey. With the summer […]

React to this headline:

Loading spinner

Baseline standards for BYOD access requirements Read More »

Avoidable digital certificate issues fuel data breaches

Avoidable digital certificate issues fuel data breaches 06/09/2023 at 06:02 By Help Net Security Among organizations that have suffered data breaches 58% were caused by issues related to digital certificates, according to a report by AppViewX and Forrester Consulting. As a result of service outages, 57% said their organizations have incurred costs upwards of $100,000

React to this headline:

Loading spinner

Avoidable digital certificate issues fuel data breaches Read More »

99% of Nigerians are crypto aware — ConsenSys report

99% of Nigerians are crypto aware — ConsenSys report 04/09/2023 at 12:02 By Cointelegraph By Gareth Jenkinson A survey featuring respondents from all seven continents suggests that Nigeria has the most crypto-aware population globally. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

99% of Nigerians are crypto aware — ConsenSys report Read More »

Spam is up, QR codes emerge as a significant threat vector

Spam is up, QR codes emerge as a significant threat vector 04/09/2023 at 07:31 By Help Net Security 85% of phishing emails utilized malicious links in the content of the email, and spam emails increased by 30% from Q1 to Q2 2023, according to a VIPRE report. Information technology organizations also overtook financial institutions (9%)

React to this headline:

Loading spinner

Spam is up, QR codes emerge as a significant threat vector Read More »

Ransomware attacks go beyond just data

Ransomware attacks go beyond just data 04/09/2023 at 07:01 By Help Net Security 65% of organizations confirmed that ransomware is one of the top three threats to their viability, and for 13%, it is the biggest threat, according to a report by Enterprise Strategy Group (ESG) and Keepit. Organizations’ strategies against ransomware According to the

React to this headline:

Loading spinner

Ransomware attacks go beyond just data Read More »

Global roaming fraud losses to surpass $8 billion by 2028

Global roaming fraud losses to surpass $8 billion by 2028 04/09/2023 at 06:31 By Help Net Security Losses from global roaming fraud are anticipated to exceed $8 billion by 2028; driven by the increase in bilateral roaming agreements for data-intensive use cases over 5G networks, according to Juniper Research. In turn, it predicts fraudulent data

React to this headline:

Loading spinner

Global roaming fraud losses to surpass $8 billion by 2028 Read More »

Cybercriminals use research contests to create new attack methods

Cybercriminals use research contests to create new attack methods 01/09/2023 at 07:17 By Help Net Security Adversary-sponsored research contests on cybercriminal forums focus on new methods of attack and evasion, according to Sophos. The contests mirror legitimate security conference ‘Call For Papers’ and provide the winners considerable financial rewards and recognition from peers and also

React to this headline:

Loading spinner

Cybercriminals use research contests to create new attack methods Read More »

The secret habits of top-performing CISOs

The secret habits of top-performing CISOs 31/08/2023 at 06:02 By Help Net Security 69% of top-performing CISOs dedicate recurring time on their calendars for personal professional development, according to Gartner. This is compared with just 36% of bottom-performing CISOs who do so. “As the CISO role continues to rapidly evolve, it becomes even more critical

React to this headline:

Loading spinner

The secret habits of top-performing CISOs Read More »

Consumer surveys show a growing distrust of AI and firms that use it

Consumer surveys show a growing distrust of AI and firms that use it 29/08/2023 at 09:02 By Cointelegraph By Jesse Coghlan A global consumer survey from Salesforce shows a growing distrust toward firms that use AI, while an Australian survey found most believe it creates more problems than it solves. This article is an excerpt

React to this headline:

Loading spinner

Consumer surveys show a growing distrust of AI and firms that use it Read More »

Navigating generative AI risks and regulatory challenges

Navigating generative AI risks and regulatory challenges 14/08/2023 at 06:33 By Help Net Security The mass availability of generative AI, such as OpenAI’s ChatGPT and Google Bard, became a top concern for enterprise risk executives in the second quarter of 2023, according to Gartner. A benchmarked view of emerging risks “Generative AI was the second

React to this headline:

Loading spinner

Navigating generative AI risks and regulatory challenges Read More »

Threat intelligence’s key role in mitigating malware threats

Threat intelligence’s key role in mitigating malware threats 11/08/2023 at 07:02 By Help Net Security Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according to OPSWAT. Crucial role of threat intelligence Threat actors leverage malware as an initial foothold to infiltrate targeted infrastructures and

React to this headline:

Loading spinner

Threat intelligence’s key role in mitigating malware threats Read More »

How executives’ personal devices threaten business security

How executives’ personal devices threaten business security 11/08/2023 at 06:02 By Help Net Security Today, individual people – not businesses or government entities as a whole – are the primary targets, or entry points, for all major cyberattacks, according to Agency. Yet, while the cyber threat landscape has seen this major shift, security software to

React to this headline:

Loading spinner

How executives’ personal devices threaten business security Read More »

Private network adoption grows as enterprises seek greater control and security

Private network adoption grows as enterprises seek greater control and security 10/08/2023 at 06:04 By Help Net Security Enterprises are turning to private networks to enhance security and resiliency, according to Spirent. “Private networks are emerging as a viable alternative to traditional enterprise networks, offering a wide range of benefits,” said Spirent’s principal strategist for

React to this headline:

Loading spinner

Private network adoption grows as enterprises seek greater control and security Read More »

37% of third-party applications have high-risk permissions

37% of third-party applications have high-risk permissions 10/08/2023 at 05:32 By Help Net Security Email attacks have increased in both sophistication and volume since the start of the year, according to Abnormal Security. Examining data since 2013, Abnormal identified a massive increase in third-party applications (apps) integrated with email, underscoring the proliferation of an emerging

React to this headline:

Loading spinner

37% of third-party applications have high-risk permissions Read More »

Recent ransomware attacks share curiously similar tactics

Recent ransomware attacks share curiously similar tactics 09/08/2023 at 12:33 By Industry News A series of ransomware attacks made by different groups share curiously similar characteristics, according to Sophos. Sophos released new findings into the connections between the most prominent ransomware groups this past year, including Royal, in its Clustering Attacker Behavior Reveals Hidden Patterns

React to this headline:

Loading spinner

Recent ransomware attacks share curiously similar tactics Read More »

Data exfiltration is now the go-to cyber extortion strategy

Data exfiltration is now the go-to cyber extortion strategy 09/08/2023 at 06:32 By Help Net Security The abuse of zero-day and one-day vulnerabilities in the past six months led to a 143% increase in victims when comparing Q1 2022 with Q1 2023, according to Akamai. Ransomware groups target the exfiltration of files The report also

React to this headline:

Loading spinner

Data exfiltration is now the go-to cyber extortion strategy Read More »

The ransomware rollercoaster continues as criminals advance their business models

The ransomware rollercoaster continues as criminals advance their business models 09/08/2023 at 06:02 By Help Net Security Ransomware shows no signs of slowing, with ransomware activity ending 13 times higher than at the start of 2023 as a proportion of all malware detections, according to Fortinet. Ransomware detections 1H 2023 FortiGuard Labs has documented substantial

React to this headline:

Loading spinner

The ransomware rollercoaster continues as criminals advance their business models Read More »

Seasoned cyber pros are more complacent in their skills than junior staff

Seasoned cyber pros are more complacent in their skills than junior staff 08/08/2023 at 06:46 By Help Net Security Average response time accelerated from 29 to 19 days, from 2021 to 2022, with lessons from Log4j and other high-profile vulnerabilities having a significant impact on urgency levels, according to Immersive Labs. Faster response time to

React to this headline:

Loading spinner

Seasoned cyber pros are more complacent in their skills than junior staff Read More »

Managing human cyber risks matters now more than ever

Managing human cyber risks matters now more than ever 08/08/2023 at 06:01 By Help Net Security As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become increasingly vital, according to the SANS Institute. The report underscores the escalating stakes in human cyber risks,

React to this headline:

Loading spinner

Managing human cyber risks matters now more than ever Read More »

Budget constraints threaten cybersecurity in government bodies

Budget constraints threaten cybersecurity in government bodies 07/08/2023 at 07:02 By Help Net Security Government organizations are attractive targets for threat actors whose motivations may be geopolitical, financial, or disruption, according to BlackBerry. Because threat actors may include private individuals, small groups, or state-sponsored APT groups (which use APT tactics), government organizations must defend against

React to this headline:

Loading spinner

Budget constraints threaten cybersecurity in government bodies Read More »

Scroll to Top