cyber risk
![shadow egineering](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07133258/shadow_egineering-400x200.webp)
Shadow engineering exposed: Addressing the risks of unauthorized engineering practices
Shadow engineering is present in many organizations, and it can lead to security, compliance, and risk challenges. In this Help Net Security video, Darren Meyer, Staff …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25125026/ai-genai-1-1500-400x200.webp)
Organizations weigh the risks and rewards of using AI
78% of organizations are tracking AI as an emerging risk while simultaneously adopting the technology themselves, according to AuditBoard. Organizations prioritize AI risk …
![cyber risks](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15162333/cyber_risks-1500-400x200.webp)
Organizations use outdated approaches to secure APIs
Security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used …
![cybersecurity threats](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17113455/cybersecurity_threats-400x200.webp)
Find out which cybersecurity threats organizations fear the most
This article compiles excerpts from various reports, presenting statistics and insights on cybersecurity threats faced by businesses and individuals alike. Cyber insurance …
![third party](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31195448/third-party-400x200.webp)
Third-party vendors pose serious cybersecurity threat to national security
In this Help Net Security video, Paul Prudhomme, Principal Security Analyst at SecurityScorecard, discusses the findings of the 2024 Redefining Resilience: Concentrated Cyber …
![cyber risks](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15162333/cyber_risks-1500-400x200.webp)
Worried about job security, cyber teams hide security incidents
The frequency and severity of cyberattacks are increasing—yet most businesses remain unprepared, according to VikingCloud. Between a growing talent shortage, alert fatigue, …
![identity risks](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/18154634/identity-risks-400x200.webp)
Technological complexity drives new wave of identity risks
Security leaders are facing increased technological and organizational complexity, which is creating a new wave of identity risks for their organizations, according to …
![cyber risks](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15162333/cyber_risks-1500-400x200.webp)
Understanding cyber risks beyond data breaches
While some may associate cyber risks primarily with technology and data breaches, they can also lead to brand or reputational harm, reduced productivity, and financial losses. …
![computer](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/25163438/computer-2-400x200.jpg)
51% of enterprises experienced a breach despite large security stacks
Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting higher: 93% of enterprises who admitted a breach reported …
![teamwork](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/09153009/teamwork-cybersecurity-400x200.jpg)
73% brace for cybersecurity impact on business in the next year or two
Only 3% of organizations across the globe have the ‘mature’ level of readiness needed to be resilient against modern cybersecurity risks, according to Cisco. The 2024 Cisco …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23151629/plan-governance-400x200.jpg)
Advanced cybersecurity strategies boost shareholder returns
Companies demonstrating advanced cybersecurity performance generate a shareholder return that is 372% higher than their peers with basic cybersecurity performance, according …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/07095552/ai-artificial_intelligence-1500-400x200.webp)
Immediate AI risks and tomorrow’s dangers
“At the most basic level, AI has given malicious attackers superpowers,” Mackenzie Jackson, developer and security advocate at GitGuardian, told the audience last …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders