![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101407/user-400x200.jpg)
Most expect the risk of privileged user abuse to increase
Insufficient privileged access management (PAM) practices continue to be a critical challenge for many organizations despite significant risks of data breaches and security …
![connected house](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104916/connected-house-400x200.jpg)
Consumers concerned about connected home privacy, still few implement safety practices
In order to understand what people are doing to protect themselves from the risk of compromised smart home devices, such as internet-connected TVs, smart thermostats, home …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
DevSecOps role expansion has changed how companies address their security posture
While organizations shift their applications to microservices environments, the responsibility for securing these environments shifts as well, Radware reveals. The rapid …
![industrial](https://img.helpnetsecurity.com/wp-content/uploads/2019/01/09095434/industrial-400x200.jpg)
ICS cybersecurity investment should be a priority in protecting operations from disruption
93% of ICS security professionals are concerned about cyberattacks causing operational shutdown or customer-impacting downtime, according to a Tripwire survey. In an effort to …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
2FA, HTTPS and private browsing still a mystery to most Americans
Most US adults know what phishing scams are and where they occur, what browser cookies do, and that advertising is the largest source of revenue for most social media …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092947/lock-400x200.jpg)
Does poor password hygiene still hamper your ability to achieve high security standards?
While more businesses are investing in security measures like multifactor authentication (MFA), employees still have poor password habits that weaken companies’ overall …
![flame](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102359/flame-flat-400x200.jpg)
Impact and prevalence of cyberattacks that use stolen hashed administrator credentials
There’s a significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks, within …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092957/dx-400x200.png)
Digital transformation requires an aggressive approach to security
Organizations agree, building security into digital transformation initiatives is a priority, yet the recommended path to progress is unclear, according to a survey conducted …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104216/phishing-400x200.jpg)
Phishing attempts increase 400%, many malicious URLs found on trusted domains
1 in 50 URLs are malicious, nearly one-third of phishing sites use HTTPS and Windows 7 exploits have grown 75% since January. A new Webroot report also highlights the …
![USB](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110808/usb-400x200.jpg)
Majority of IT departments leave major holes in their USB drive security
For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112020/email-1-400x200.jpg)
BEC explodes as attackers exploit email’s identity crisis
850,000 domains worldwide now have DMARC records, a 5x increase since 2016, according to Valimail. However, less than 17% of global DMARC records are at enforcement — meaning …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112909/user-400x200.jpg)
Internal user mistakes create large percentage of cybersecurity incidents
Internal user mistakes created the largest percentage of cybersecurity incidents over the past twelve months (80%), followed by exposures caused by poor network system or …
Featured news
Sponsored
Don't miss
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality
- FIN7 sells improved EDR killer tool
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)