![Audit](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/04145232/audit-400x200.jpg)
Internal auditors stepping up to become strategic advisors in the fight against fraud
A report from the Internal Audit Foundation, The Institute of Internal Auditors (IIA) and Kroll, is based on a recent global survey and focus groups with internal auditors, …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
49% of small medical practices don’t have a cyberattack response plan
Sophisticated cyberattacks are crippling healthcare providers by posing a threat to core functions and patient privacy, according to Software Advice survey. Findings reveal …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110014/robot-1-400x200.jpg)
What is undermining ML initiatives?
Comet announced the results of its recent survey of machine learning professionals. Hundreds of enterprise ML practitioners were asked about their experiences and the factors …
![hybrid work](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090659/hybrid_1_hns-400x200.jpg)
IT in manufacturing insufficiently prepared to support long-term hybrid work
Riverbed | Aternity reveals that 51% business decision makers (BDMs) in the manufacturing industry believe that 50% of their workforce will remain hybrid post-pandemic. …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094408/cloud2-400x200.jpg)
Cloud native application security is a critical priority, risk perception is worryingly low
Aqua Security has announced the results of a study which reveals that UK organizations have a long road ahead when it comes to understanding, planning and deploying their …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104104/laptop-400x200.jpg)
Making security mistakes may come with a high price for employees
Tessian reveals that one in four employees lost their job in the last 12 months, after making a mistake that compromised their company’s security. The new report, which …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101804/certificate-400x200.jpg)
Lack of CLM maturity is putting organizations at risk
More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and …
![apple](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104350/apple-400x200.jpg)
How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?
Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/12075527/ransomware-hands-400x200.jpg)
Not enough businesses have a formal ransomware plan in place
A research from Thales has found that malware, ransomware and phishing continues to plague global organizations. In fact, 21% have experienced a ransomware attack in the last …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095742/data-400x200.jpg)
What’s stopping organizations from becoming data-driven?
A study conducted among CIOs, chief data officers and vice presidents in data-oriented positions released by Domo, pointed to a significant data decision gap impacting …
![Metaverse](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/23142408/woman-g26114912f_1920-400x200.jpg)
The importance of data in the metaverse
A research from Bright Data has highlighted the importance of data in virtual environments such as the metaverse. The survey, conducted by Vanson Bourne, generated insights …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103200/cloud-400x200.jpg)
The challenge of planning an IAM strategy for multi-cloud environments to avoid risk
According to the Strata Identity and Forrester study, 78% of IT decision-makers said managing user identities between multiple clouds is the number one challenge. The study …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints