Help Net Security
How digital transformation impacted CIO and CTO roles
Transposit announced results from a recent research study about the evolving roles of the CIO and CTO, as well as the extent of and attitudes towards adoption of DevOps …
2 million malicious emails bypassed secure email gateways in 12 months
Two million malicious emails bypassed traditional email defenses, like secure email gateways, between July 2020-July 2021, according to data from Tessian. Who’s being targeted …
Whole cloud spending to surpass $1.3 trillion by 2025
Over the past decade, cloud computing has become the foundation for the delivery of mobile and content services as well as an alternative to traditional enterprise computing …
Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings
Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching …
Industry trends and insights of CISOs around the world
Marlin Hawk released a research report which explores industry trends and insights of CISOs around the world, the challenges they face in the cybersecurity landscape, as well …
77% of execs concerned about security tools gaps in their company
77% of Americans believe their company has gaps in its current security tools, according to Lynx Software survey findings. 500 Americans in managerial and executive roles were …
Organizations prioritize strategic security programs, but lack fundamentals
Organizations are prioritizing strategic security programs but missing the foundational capabilities they need to make meaningful changes to their security posture, a …
Office workers unwilling to change their behavior, despite being aware of the cybersecurity challenges
Despite office workers being aware of the cybersecurity challenges faced by their employer – especially when it comes to hybrid working – many admit to high risk …
3-D Secure transactions growth fueled by card-not-present explosion and PSD2
A massive $100 billion in transactions in 2021 alone have been protected by 3-D Secure payments authentication technology, Outseer reveals. The report also reveals continued …
How to retain the best talent in a competitive cybersecurity market
We are currently experiencing The Great Resignation, where millions of people are leaving their jobs in search of increased satisfaction. The global pandemic gave many the …
What businesses need to know about data decay
Data decay is the aging and obsolescence of data in such a way that makes it no longer usable due to loss of its integrity, completeness, and accuracy. Data that can no longer …
Zero trust security solutions widely adopted, spurred by surge in ransomware
Over a decade after the zero trust security concept was first introduced, Ericom’s survey results indicate that zero trust solutions are being widely adopted. Spurred by the …
Featured news
Resources
Don't miss
- Building cyber talent through competition, residency, and real-world immersion
- Browser agents don’t always respect your privacy choices
- Anubis: Open-source web AI firewall to protect from scraper bots
- Session tokens give attackers a shortcut around MFA
- AI isn’t one system, and your threat model shouldn’t be either