Censuswide
![people](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111052/people-400x200.jpg)
After a cyber breach, companies risk losing employees’ trust
54% of office workers would reconsider working for a company that had recently experienced a cyber breach, according to a study by Encore. An independent study of 100 C-level …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111221/tools-400x200.jpg)
Outdated infrastructure not up to today’s ransomware challenges
A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Cosumers don’t think they can dodge identity fraud
Nearly one in 10 smartphone users in the UK (9%), as many as 5.7 million people, have fallen victim to identity fraud in the last 12 months, according to a research by GBG. …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092943/aid2-400x200.jpg)
What is challenging secure application development?
A Censuswide report reveals the biggest security challenges that application security (AppSec) managers and software developers are facing within their organizations in …
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/17123146/healthcare-attack-heart-400x200.jpg)
Healthcare organizations at risk: The attack surface is expanding
Armis released data showing the increased security risk faced by healthcare organizations and patients as an increase in connected devices creates an expanded attack surface, …
![find](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094457/find-400x200.jpg)
Why poor visibility is hampering cybersecurity
Enterprises are challenged with security basics, according to Panaseer’s first Security Leader’s Peer Report. Data from an external survey of 200 enterprise …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD