Please turn on your JavaScript for this page to function normally.
cloud
The importance of understanding cloud native security risks

In this video for Help Net Security, Paul Calatayud, CISO at Aqua Security, talks about cloud native security and the problem with the lack of understanding of risks to this …

calculator
18% of the top 99 insurance carriers have a high susceptibility to ransomware

Black Kite released a report that examines rising cyber risk concerns and ransomware susceptibility in the insurance sector. The most notable takeaway: nearly 20% of the top …

connection
Steady rise in severe web vulnerabilities

Invicti Security released a research which reveals a rise in severe web vulnerabilities and the need for executive leaders to intertwine their application security and digital …

IoT
How many steps does it take for attackers to compromise critical assets?

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid …

James Turgal
Hybrid threat model: Watch out for the unhappy employee

In this interview with Help Net Security, James Turgal, VP of Cyber Risk, Strategy and Board Relations at Optiv Security, talks about the hybrid threat model, a new approach …

healthcare
49% of small medical practices don’t have a cyberattack response plan

Sophisticated cyberattacks are crippling healthcare providers by posing a threat to core functions and patient privacy, according to Software Advice survey. Findings reveal …

Zur Ulianitzky
New and less known cybersecurity risks you should be aware of

In this interview with Help Net Security, Zur Ulianitzky, Head of Security Research at XM CYber, gives insights on new and less talked about cybersecurity risks organizations …

cloud
Cloud native application security is a critical priority, risk perception is worryingly low

Aqua Security has announced the results of a study which reveals that UK organizations have a long road ahead when it comes to understanding, planning and deploying their …

VR
Is IT ready for the metaverse? If not, it should be

Info-Tech Research Group has released a research to help IT departments identify risks in deploying metaverse solutions and how to mitigate them. This new research explores …

ransomware
Not enough businesses have a formal ransomware plan in place

A research from Thales has found that malware, ransomware and phishing continues to plague global organizations. In fact, 21% have experienced a ransomware attack in the last …

wolf
Trends, threats and techniques that comprised the 2021 threat landscape

Ransomware dominated the threat landscape in 2021, with groups adopting new techniques such as double extortion and “as-a-service” models to evade detection and maximize their …

lock
Strengthening third-party vendor programs in times of crisis and beyond

The ongoing global turmoil has tested the supply chain across industries in a myriad of ways – from strained resources and remote workflows to security concerns and more. …

Don't miss

Cybersecurity news