cyber risk
![Samsung](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104511/samsung-400x200.jpeg)
Large number of mobile apps may be vulnerable to hacking
A team of cybersecurity researchers has discovered that a large number of mobile apps contain hardcoded secrets allowing others to access private data or block content …
![RDP VPN](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/30130919/rdp_vpn_world-400x200.jpg)
RDP and VPN use soars, increasing enterprise cyber risk
As COVID-19 slowly spread across the globe, consumer demand for commercial virtual private network (VPN) services has soared – both for security reasons and for …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/11105012/risk-low-high-400x200.jpg)
Organizations not properly set up to manage risk, coronavirus pandemic reveals
Organizations’ current approach to risk governance is not sufficient to tackle the complex risk environment organizations are facing today, according to Gartner. The COVID-19 …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113044/vault-1-400x200.jpg)
Businesses can avoid fines if customer data is encrypted or redacted
Encryption provides the best defense against any fines that might be levied for violations or data breaches under CCPA, according to ESG and Fortanix. What can you do? The …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09093017/insider_threat-400x200.jpg)
Legal industry at great risk from insider data breaches
A staggering 96% of IT leaders in the legal sector say insider breach risk is a significant concern, according to Egress. 77% think employees have put data at risk …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103351/businessman-400x200.jpg)
What’s preventing organizations from making pragmatic security decisions?
Human beings are poor judges of risk. For example, we perceive the risk of air travel to be higher than it actually is after a fatal aviation-related accident happens. We also …
![virtual reality](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112824/virtual_reality-400x200.jpg)
Increasing number of false positives causing risk of alert fatigue
More than two-fifths (43%) of organizations experience false positive alerts in more than 20% of cases, while 15% reported more than half of their security alerts are false …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
Too many alarms and too few security analysts? Think SOAR
Security automation, orchestration and response (SOAR) speeds up the incident response process by replacing manual tasks with automated workflows. We sat down with Swimlane …
![arrows](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093759/arrow-400x200.jpg)
Over 60% of the Fortune 1000 had at least one public breach over the last decade
Over 60% of the Fortune 1000 had at least one public breach over the last decade, according to a Cyentia Institute research. On an annual basis, it is estimated one in four …
![Lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113522/lock-eye-400x200.png)
How financial services firms are handling data privacy
One-third of financial services organizations lack a clear plan or the resources to address privacy risks related to customer data in the next 12 months, according to a report …
![ProcessUnity](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/15161851/processunity-tprmp-400x200.jpg)
How organizations can maintain a third-party risk management program from day one
In this podcast recorded at RSA Conference 2020, Sean Cronin, CEO of ProcessUnity, talks about the importance of third-party risk management and how companies can get started …
![find](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094457/find-400x200.jpg)
Cloud + BYOD + IoT = major security gaps
Despite having hundreds of tools at their disposal, IT and security teams are rapidly losing sight of their asset landscape. That’s the finding from a survey from Axonius, …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints