Help Net Security
How much trust should we place in the security of biometric data?
An increasing number of people around the world are being displaced by factors such as climate change, natural disasters, and wars. The people attempting to cross …
Third-party risk prevention strategies inadequate despite organizations being aware of the threats
While organizations recognize third-party threats expose them to great risk, many organizations fail to take adequate measures to mitigate it. In fact, while they grapple with …
Nation-state attacks fears grow, execs don’t trust governments to protect them from cyber threats
Arctic Wolf published findings from a recent global survey of over 1,400 IT decision-makers at enterprise organizations. After a year of high-profile cyberattacks, the survey …
SASE initiatives are gaining momentum
Axis Security and ESG unveiled a quantitative survey research of more than 600 cybersecurity, networking, and IT professionals in North America, UK, France, and Germany who …
C-level execs confident in their software supply chain security, but challenges remain
A survey of C-level executives released by CloudBees reveals high confidence levels in software supply chain security but a limited understanding of the essential components …
CSPs deploying AI to improve customer experience and reduce operational costs
Communication Service Providers (CSPs) are making AI deployments an immediate priority to improve service experience for customers and reduce operational costs, an Anodot …
Ransomware attacks on the rise – How to counter them?
In June 2012, Deloitte conducted an online survey of 50 C-suite and other executives about cyber threat detection and response and found that almost 87% of the pollees …
IT executives do not believe their business can have both a flexible and usable Kubernetes environment
A Dimensional Research survey shares Kubernetes best practices and key insights about the rapidly growing and evolving use of Kubernetes within businesses. The findings of the …
Ransomware attacks on healthcare organizations may have life-or-death consequences
Ponemon Institute surveyed 597 IT and IT security professionals to understand how COVID-19 has impacted how healthcare delivery organizations (HDOs) protect patient care and …
Certificates volume growing, most enterprises considering PKI automation to reduce risks
The typical enterprise manages over 50,000 publicly and privately trusted PKI certificates, a DigiCert survey shows. Manually managing this volume of certificates can lead to …
CDO role not yet recognized, expectations too high and misinformed
Despite high demand for strong data leadership, there is still much confusion and uncertainty about the Chief Data Officer (CDO) role. This is according to a study launched by …
To avoid cyberattacks, companies need to think like hackers
Companies are spending more than ever on cybersecurity but, despite a plethora of new security systems, they continue to be vulnerable to attacks, which are not only becoming …
Featured news
Sponsored
Don't miss
- Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
- Cross-industry standards for data provenance in AI
- Shuffle Automation: Open-source security automation platform
- Cyber insurance 2.0: The systemic changes required for future security
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update