![calculator](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104745/calculator-400x200.jpg)
18% of the top 99 insurance carriers have a high susceptibility to ransomware
Black Kite released a report that examines rising cyber risk concerns and ransomware susceptibility in the insurance sector. The most notable takeaway: nearly 20% of the top …
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095605/connection-400x200.jpg)
Steady rise in severe web vulnerabilities
Invicti Security released a research which reveals a rise in severe web vulnerabilities and the need for executive leaders to intertwine their application security and digital …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110221/iot-1-400x200.jpg)
How many steps does it take for attackers to compromise critical assets?
The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195211/business-400x200.jpg)
The latest salary trends in the global DevOps industry
Puppet revealed the findings of its report which revealed how the post-pandemic environment directly impacted DevOps salaries as organizations invest in competitive …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093404/money-400x200.jpg)
63% of organizations paid the ransom last year
A record 71% of organizations were impacted by successful ransomware attacks last year, according to a CyberEdge Group report, up from 55% in 2017. Of those that were …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
How often do developers push vulnerable code?
A Tromzo report reveals developers remediate only 32% of vulnerabilities and regularly push vulnerable code. The report was based on a survey of more than 400 U.S.-based …
![Keeper Compliance Reports](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/05101521/keeper_security-cr-400x200.jpg)
Keeper Compliance Reports
In this video, Craig Lurey, CTO and Co-Founder of Keeper Security, talks about the new secure add-on to the Keeper enterprise platform, called Compliance Reports. Keeper …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093341/crypto-coin-400x200.jpg)
Malicious actors targeting the cloud for cryptocurrency-mining activities
Trend Micro announced a report revealing a fierce, hour-by-hour battle for resources among malicious cryptocurrency mining groups. “Just a few hours of compromise could …
![Audit](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/04145232/audit-400x200.jpg)
Internal auditors stepping up to become strategic advisors in the fight against fraud
A report from the Internal Audit Foundation, The Institute of Internal Auditors (IIA) and Kroll, is based on a recent global survey and focus groups with internal auditors, …
![hybrid work](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090659/hybrid_1_hns-400x200.jpg)
IT in manufacturing insufficiently prepared to support long-term hybrid work
Riverbed | Aternity reveals that 51% business decision makers (BDMs) in the manufacturing industry believe that 50% of their workforce will remain hybrid post-pandemic. …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104104/laptop-400x200.jpg)
Making security mistakes may come with a high price for employees
Tessian reveals that one in four employees lost their job in the last 12 months, after making a mistake that compromised their company’s security. The new report, which …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101804/certificate-400x200.jpg)
Lack of CLM maturity is putting organizations at risk
More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?