![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
The factors driving today’s accelerated zero trust adoption
Zero trust has quickly progressed from a buzzword to a critical business imperative, Okta’s 2022 State of Zero Trust Security Report has found. Today, 97% of businesses say …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
Identity crimes reach all-time high
The Identity Theft Resource Center (ITRC) has published a report that looks at the identity crimes committed against individuals as reported by the victims of those crimes. In …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
What is challenging successful DevSecOps adoption?
Mezmo published an ESG report which provides insights on DevSecOps adoption, its benefits, and the challenges with implementation. According to the study, only 22% of …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093937/email-400x200.jpg)
Response-based attacks make up 41% of all email-based scams
Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
Ransomware is back, healthcare sector most targeted
In Q2 2022, Kroll observed a 90% increase in the number of healthcare organizations targeted in comparison with Q1 2022, dropping the final nail in the coffin for the “truce” …
![security awareness](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18071416/sec-awareness-400x200.jpg)
25% of employees don’t care enough about cybersecurity to report a security incident
According to a new Tessian report, 30% employees do not think they personally play a role in maintaining their company’s cybersecurity posture. This Help Net Security video …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27135730/ransomware_2_27082021-400x200.jpg)
Ransomware is not going anywhere: Attacks are up 24%
Avast released a report revealing a significant increase in global ransomware attacks, up 24% from Q1/2022. Researchers also uncovered a new zero-day exploit in Chrome, as …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092943/aid2-400x200.jpg)
The impact of exploitable misconfigurations on network security
Network professionals feel confident with their security and compliance practices but data suggests that they also leave their organizations open to risk, which is costing a …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/31160247/email-smoke-red-400x200.jpg)
Which malware delivery techniques are currently favored by attackers?
A wave of cybercriminals spreading malware families – including QakBot, IceID, Emotet, and RedLine Stealer – are shifting to shortcut (LNK) files for email malware delivery. …
![Black Hat](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093853/blackhat2-400x200.jpg)
What Black Hat USA 2022 attendees are concerned about
Black Hat released its Supply Chain and Cloud Security Risks Are Top of Mind survey. The report highlights important findings from more than 180 of experienced cybersecurity …
![Kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093637/kubernetes2-400x200.jpg)
Organizations grew to love Kubernetes: Usage in production is high
Kubernetes is delivering business value and is set to win an increasing share of production workloads, with almost all respondents to a Dimensional Research study saying they …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094418/email-danger-400x200.jpg)
Universities are at risk of email-based impersonation attacks
Proofpoint released new research which found that the top universities in the United States, the United Kingdom and Australia are lagging on basic cybersecurity measures, …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?