![cyber insurance](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08133531/cyber_insurance-yellow-400x200.jpg)
Most startups have cyber insurance but are uncertain about how much risk is covered
Despite the significant economic headwinds startups currently face – from a challenging fundraising landscape to inflation woes and difficult operational decisions – company …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
Leveraging the full potential of zero trust
More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, …
![up](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102706/up-400x200.jpg)
Top 7 factors boosting enterprise cybersecurity resilience
Cybersecurity resilience is a top priority for companies as they look to defend against a rapidly evolving threat landscape, according to the latest edition of Cisco’s annual …
![medical devices](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/11091922/medical_devices_gradient-400x200.jpg)
Connected medical devices are the Achilles’ heel of healthcare orgs
The rising adoption of connected medical devices is accelerating cyberattacks, according to Capterra’s Medical IoT Survey of healthcare IT professionals. The survey also …
![Army](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/29122959/police-g804db4409_1920-400x200.jpg)
Federal defense contractors are not properly securing military secrets
Defense contractors hold information that’s vital to national security and will soon be required to meet Cybersecurity Maturity Model Certification (CMMC) compliance to …
![NDR](https://img.helpnetsecurity.com/wp-content/uploads/2020/07/13081444/ndr--400x200.jpg)
Security pros feel threat detection and response workloads have increased
A new report conducted by Enterprise Strategy Group (ESG) highlights why today’s security teams find it increasingly difficult to detect and stop cyber threats targeting their …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/05174135/shield-400x200.jpg)
CISOs’ priorities for the coming year
BlueFort Security has announced the results of its 2022 CISO survey, which revealed that while CISOs are still experiencing challenges around visibility, intelligence and …
![online shopping](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102510/online_shopping-400x200.jpg)
The emergence of zero trust consumers
A survey report from Daon shows 92% of consumers believe that cybersecurity threats will continue to outpace cybersecurity technology, with 91% willing to take extra security …
![Kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093639/kubernetes-400x200.jpg)
The pros and cons of using open-source Kubernetes security software
Open source tools are a key part of the Kubernetes security environment, with most companies using open source Kubernetes security software, research by ARMO has revealed. In …
![cloud hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110822/cloud-hand-400x200.jpg)
Cloud data protection trends you need to be aware of
Veeam Software released the findings of the company’s Cloud Protection Trends Report 2023, covering four key “as a Service” scenarios: Infrastructure as a Service (IaaS), …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2018/08/09100449/email_security2-400x200.jpg)
Top enterprise email threats and how to counter them
A research from Tessian, the State of Email Security Report, found that enterprise email is now the No. 1 threat vector for cyberattacks. According to the report, 94% of …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100625/devsecops-400x200.jpg)
Security leaders want consequences for insecure code
Organizations plan to invest in DevSecOps in 2023, and the level of urgency for them to do so has grown. In a recent survey conducted by the Neustar International Security …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints