![Jake King](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24132843/jake_king-2-elastic_security_labs-400x200.webp)
How companies increase risk exposure with rushed LLM deployments
In this Help Net Security interview, Jake King, Head of Threat & Security Intelligence at Elastic, discusses companies’ exposure to new security risks and …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/12155822/cloud-security-400x200.webp)
47% of corporate data stored in the cloud is sensitive
As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyberattacks, with SaaS applications …
![GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21124934/github-door-1500-400x200.webp)
Developer errors lead to long-term exposure of sensitive data in Git repos
Credentials, API tokens, and passkeys – collectively referred to as secrets – from organizations around the globe were exposed for years, according to Aqua Security’s …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/27142028/genai-2-1500-400x200.webp)
42% plan to use API security for AI data protection
While 75% of enterprises are implementing AI, 72% report significant data quality issues and an inability to scale data practices, according to F5. Data and the systems …
![database](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151902/database-400x200.jpg)
Widespread data silos slow down security response times
Although the goals and challenges of IT and security professionals intersect, 72% report security data and IT data are siloed in their organization, which contributes to …
![cybersecurity regulations](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/02145135/cybersecurity_regulations-1400-400x200.jpg)
Despite increased budgets, organizations struggle with compliance
Only 40% of organizations feel fully prepared to meet the compliance demands of rising cybersecurity regulations, according to a new Swimlane report. Organizations still feel …
![SEC](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/20102811/us-sec-1500-400x200.webp)
SEC requires financial institutions to notify customers of breaches within 30 days
The Securities and Exchange Commission (SEC) announced the adoption of amendments to Regulation S-P to modernize and enhance the rules that govern the treatment of consumers’ …
![healthcare cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/08135631/healthcare_cybersecurity-400x200.jpg)
Ransomware attacks impact 20% of sensitive data in healthcare orgs
Recent cyber incidents demonstrate the healthcare industry continues to be a prime target for ransomware hackers, according to Rubrik. New research by Rubrik Zero Labs reveals …
![data privacy](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/24123138/data-privacy-1500-400x200.webp)
Privacy requests increased 246% in two years
Data Subject Requests (DSRs) — formal requests made to a company by a person to access, delete, or request not to sell/share the personal data that the company holds on them — …
![Assaf Mischari](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/16121518/assaf_mischari-2-team8-400x200.webp)
Overcoming GenAI challenges in healthcare cybersecurity
In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on …
![access](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29223248/access-400x200.webp)
How manual access reviews might be weakening your defenses
As businesses evolve, they often experience changes in roles, partnerships, and staff turnover. This dynamic can result in improper access to data and resources. Such …
![location tracking](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/29221945/location-tracking-1-1500-400x200.webp)
Location tracking and the battle for digital privacy
While some online privacy issues can be subtle and difficult to understand, location tracking is very simple – and very scary. Perhaps nothing reveals more about who we are …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders