data breach
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
Most organizations plan to increase their cybersecurity budgets in 2020
With the perpetually shifting threat landscape, most organizations (over 90%) believe that the cyber threat landscape will stay the same or worsen in 2020, according to …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105020/hands-400x200.jpg)
People are the very first element in a pragmatic cybersecurity strategy
39 percent of cybersecurity and IT executives indicate their company is under-prepared to handle a data breach and 66 percent prefer negotiating with a used car salesperson …
![Cybersecurity risk management](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092752/cybersecurity_risk_management-400x200.jpg)
Companies should disclose cybersecurity risk management efforts
Research finds that when one company experiences a cybersecurity breach, other companies in the same field also become less attractive to investors. However, companies that …
![flame](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102359/flame-flat-400x200.jpg)
Leading domain name registrars suffered data breach
Web technology company Web.com and its subsidiaries – domain name registrars Register.com and Network Solutions – have suffered a data breach. What happened? …
![gap](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105311/gap-400x200.png)
Majority of 2019 breaches were the result of unapplied security patches
Despite a 24% average increase in annual spending on prevention, detection and remediation in 2019 compared with 2018, patching is delayed an average of 12 days due to data …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
Is the enterprise on the brink of a global web supply chain attack?
Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095359/bomb-400x200.jpg)
Companies unprepared to deal with mobile attacks, synthetic identity fraud, CCPA compliance
There is a growing impact of large-scale data breaches and fraud on consumer trust and the critical need for businesses to balance the digital consumer experience with strong …
![Unicredit](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092816/unicredit-400x200.jpg)
UniCredit says personal data of 3 million customers was compromised
Italian global banking and financial services giant UniCredit has announced that its cybersecurity team has identified “a data incident” that resulted in the …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103351/businessman-400x200.jpg)
CIO role remains critical in leading enterprises through crises and transformations
The march to digitalization is so commonplace today that 40% of global CIOs have reached scale for their digital endeavors, more than doubling the proportion of enterprises …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092837/stop2-400x200.jpg)
A data breach could be game over for a brand
Data security is a legitimate worry for today’s consumers around the world, Ping Identity survey reveals. Approximately one half (49%) of respondents report that they are more …
![Datto report](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092928/datto_report-400x200.jpg)
1 in 5 SMBs have fallen victim to a ransomware attack
Ransomware remains the most common cyber threat to SMBs, according to a Datto survey of more than 1,400 MSP decision makers that manage the IT systems for …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102449/puzzle-400x200.jpg)
Executives are not actively engaged in ensuring the effectiveness of cybersecurity strategy
There’s a clear lack of accountability, especially on the board and among C-suite executives, and a lack of confidence in determining the efficacy of security …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints