data breach
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105618/cloud-400x200.jpg)
Major threats to cloud infrastructure security include a lack of visibility and inadequate IAM
98% of companies had experienced at least one cloud data breach in the past 18 months compared to 79% last year, according to an IDC survey. Meanwhile, 67% reported three or …
![colors](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100157/colors-400x200.jpg)
An organization’s security posture will benefit from increased coordination
NAVEX Global released key findings from its survey of IT security professionals in the U.S. and U.K. on the collaboration between the IT and risk management functions. …
![smart cybersecurity spending](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104414/smart_cybersecurity_spending-400x200.jpg)
SMBs willing to spend more money to protect their data
Cybersecurity remains a top priority for SMBs worldwide, as revealed in a survey conducted by Vanson Bourne. The report found that organizations are challenged to find a MSP …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094211/lock-400x200.jpg)
Researchers design new techniques to bolster computer security
Because corporations and governments rely on computers and the internet to run everything from the electric grid, healthcare, and water systems, computer security is extremely …
![money online](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105720/money-online-400x200.png)
Most businesses to accelerate data security investments in 2021
71 percent of enterprise executives reported their organization’s data and AI timelines have accelerated since the onset of the COVID-19 pandemic, with one in four reporting …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102838/cloud-400x200.jpg)
Cloud security posture confidence is high, yet most IT pros have experienced a cloud-related breach
OpsCompass announced the results of a report it conducted on cloud security posture and management challenges. The report is based on survey responses from 253 full-time, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100640/cloud-400x200.jpg)
Understanding the cloud shared responsibility model
Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, …
![remote workforce protection](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/08091029/remote_workforce_protection2-400x200.jpg)
Corporate attack surfaces growing concurrently with a dispersed workforce
Zscaler released a report on the state of corporate attack surfaces. Based on data sourced between February 2020 and April 2021, the report provides a first-ever look at the …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
Identity management is now mostly about security
IDSA released a study based on an online survey of over 500 IT decision makers. The report examines the impact that the pandemic and increase in remote work had on identity …
![syringe](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094041/syringe1-400x200.jpg)
Vaccine passports challenged by data privacy and security implications
With the ongoing distribution of COVID-19 vaccines across the globe and the broader U.S. economy preparing to reopen, the question of international travel has become a topic …
![syringe](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094041/syringe1-400x200.jpg)
Digital criminals turn toward vaccines to capitalize on COVID-19
Cybercriminals continue to capitalize on the hysteria and worry caused by COVID-19, both in the physical sphere and digital ecosystem, exploiting the significant global unmet …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/20075020/risk-hand-400x200.jpg)
Mitigating third-party risks with effective cyber risk management
Third-party engagement has steadily become an essential part of business operations for many organizations, enlisted for all kinds of products and services across nearly all …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints