Please turn on your JavaScript for this page to function normally.
data analytics
Only 9% of IT budgets are dedicated to security

Despite their best efforts, 67% of businesses say they need to improve security and compliance measures with 24% rating their organization’s security and compliance strategy …

cyber war readiness
Why cyber war readiness is critical for democracies

Once the war in Ukraine ends, Russia’s offensive cyber capabilities will be directed towards other targets, Rik Ferguson, VP Security Intelligence for Forescout, …

Audit
Internal audit leaders are wary of key tech investments

As the digital transformation of business accelerates, risk and internal audit leaders shift their focus to managing technology-driven risk, according to AuditBoard. The …

cloud
Traditional cloud security isn’t up to the task

In the last year, 47% of all data breaches originated in the cloud, and more than 6 in 10 respondents believe cloud security is lacking and poses a severe risk to their …

spotlight
AI disinformation campaigns pose major threat to 2024 elections

AI, post-quantum cryptography, zero trust, cryptography research, and election security will shape cybersecurity strategies in the present and for 2024, according to NTT. As …

path
Transforming cybersecurity from reactive to proactive with attack path analysis

An attack path is important to prioritize potential risks in cloud environments. The attack path offers the ability to look at cloud environments from the attacker’s …

GenAI
Rise in automated attacks troubles ecommerce industry

Automated attacks on application business logic, carried out by sophisticated bad bots, were the leading threat for online retailers, according to Imperva. In addition, …

cyber threat
Telemetry gaps leave networks vulnerable as attackers move faster

Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide …

cyber insurance
Cyber insurance predictions for 2024

In this Help Net Security video, Dara Gibson, Senior Cyber Insurance Manager at Optiv, discusses cyber insurance and what we should expect to see in 2024: Ransomware, BEC, and …

executives
AI helps leaders optimize costs and mitigate risks

AI is dominating the mindshare of IT leaders this year and next, as 72% believe their organization will be using more AI in the next two to three years, according to Snow …

API
The new imperative in API security strategy

Of the 239 vulnerabilities, 33% (79 out of 239) were associated with authentication, authorization and access control (AAA) — foundational pillars of API security, according …

lock
Crypto asset discovery and the post-quantum migration

Quantum computing is reshaping our world and will revolutionize many industries, including materials science, life sciences, transportation, and energy. Google recently …

Don't miss

Cybersecurity news