![email overload](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/11141504/data-overload-1400-400x200.jpg)
26% of organizations lack any form of IT security training
26% of organizations don’t provide IT security training to end-users, according to Hornetsecurity. The Hornetsecurity survey, which compiled feedback from industry …
![smb threats](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/27165727/smb_threats-400x200.jpg)
78% of SMBs fear cyberattacks could shut down their business
94% of SMBs have experienced at least one cyberattack, a dramatic rise from 64% in 2019, according to ConnectWise. This increase in cyberattacks is exacerbated by the fact …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143238/cyber-threat1-400x200.jpg)
Chinese attackers leverage previously unseen malware for espionage
Sophos released its report, “Operation Crimson Palace: Threat Hunting Unveils Multiple Clusters of Chinese State-Sponsored Activity Targeting Southeast Asia,” which details a …
![botnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15161411/botnet-400x200.webp)
Find out which cyber threats you should be concerned about
This article includes excerpts from various reports that offer statistics and insights into the current cyber threat landscape. Human error still perceived as the Achilles’ …
![software](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151859/software-dev2-400x200.jpg)
Security challenges mount as companies handle thousands of APIs
Modern applications are taking over enterprise portfolios, with apps classed as modern now making up 51% of the total, up by more than a quarter in the last year, according to …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/06125626/digital_transformation1-400x200.jpg)
Businesses must prioritize digital trust to avoid major problems
As organizations pursue digital transformation, they urgently need to prioritize digital trust to achieve their goals and prepare for future market opportunities, legislation, …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/11084626/zero-trust-1500-2-400x200.webp)
Lack of skills and budget slow zero-trust implementation
The risk of a cyber breach is the number one global driver for zero trust strategy implementation, according to Entrust. The 2024 State of Zero Trust & Encryption Study …
![chip](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07120933/chip-400x200.jpg)
59% of public sector apps carry long-standing security flaws
Applications developed by public sector organizations have more security debt than those created by the private sector, according to Veracode. Security debt, defined for this …
![identity risks](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/18154634/identity-risks-400x200.webp)
Identity-related incidents becoming severe, costing organizations a fortune
With the rise of identity sprawl and system complexity, more businesses are suffering identity-related incidents than ever before, according to IDSA. Identity-related …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/27142033/genai-1-1500-400x200.webp)
A closer look at GenAI impact on businesses
This article includes excerpts from various reports that provide statistics and insights on GenAI and its impact on businesses. CEOs accelerate GenAI adoption despite …
![database](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19151902/database-400x200.jpg)
Widespread data silos slow down security response times
Although the goals and challenges of IT and security professionals intersect, 72% report security data and IT data are siloed in their organization, which contributes to …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/15121401/cloud-red-400x200.jpg)
34% of organizations lack cloud cybersecurity skills
Incident response today is too time consuming and manual, leaving organizations vulnerable to damage due to their inability to efficiently investigate and respond to …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders