![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Employees who witness compliance violations twice as likely to leave company
Twenty-nine percent of employees observed at least one compliance violation at work in 2016 or 2017, according to a survey by Gartner. The survey, which sampled more than …
![insider threat](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101840/insider_threat-1-400x200.jpg)
Do your users understand your cybersecurity policy?
ObserveIT surveyed more than 1,000 full-time employees ages 18-65+ at organizations with more than 500 employees on their understanding and awareness of cybersecurity …
![dark](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103342/dark-1-400x200.jpeg)
Top 10 list of dark web activities that indicate a breach
Research analysts at Terbium Labs released a list of the most common activities seen on the dark web that indicate a breach, or other unwanted incident, has taken place. …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100459/lock-400x200.jpg)
Digital trust: Security pros, business execs and consumers see it differently
An extensive global survey of consumers, cybersecurity professionals and business executives about their views on digital trust conducted by analyst firm Frost & …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112023/face-400x200.jpg)
Insights into consumer attitudes to biometric payments
Biometric payments are poised for significant growth, but substantial consumer security concerns could put its future at risk according to a new report from Transaction …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104929/iot-400x200.jpg)
Risks grow, yet security is still an afterthought in many IoT strategies
Trend Micro released survey findings that show businesses are most concerned about losing customer trust in the event of an Internet of Things related cyber attack, however …
![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113757/business-400x200.jpg)
Business leaders concerned about security, data backup is a key opportunity
New research from Kaseya shows how IT groups at SMBs are faring as IT management demands grow in both number and complexity. The survey, based on input from nearly 1,300 …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101559/email-400x200.jpg)
The primary email security challenge enterprises face is trust
Only 34 percent of users without email security responsibility recall seeing email-based attacks in their inboxes, compared to 85 percent of email security professionals, …
![SAP](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101227/sap-400x200.jpg)
ERP applications under attack: How criminals target the crown jewels
Business-critical applications running the biggest organizations in the world are under attack, according to research from Digital Shadows and Onapsis. The report shows a rise …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102617/phishing-400x200.jpg)
Attackers playing into users’ commitment to security continue to sail through defenses
KnowBe4 shared its Top 10 Global Phishing Email Subject Lines for Q2 2018. The messages in the report are based on simulated phishing tests users received or real-world emails …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
72% of CEOs admit they’ve taken intellectual property from a former employer
In a clear demonstration that top executives defy data security best practices and company policy, 72 percent of CEOs admit they’ve taken valuable intellectual property (IP) …
![fence](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101822/fence-400x200.jpg)
Adopting a Zero Trust approach is the best strategy to control access
A new study conducted by Forrester Consulting found that organizations powering Zero Trust Security with next-gen access solutions reported twice the confidence to accelerate …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality