![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
How the cloud skills gap is hindering business development
Cloudreach released data highlighting the latest cloud technology trends, underscoring the impact the cloud skills gap is having on businesses. More than 70% of surveyed IT …
![hybrid work](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090703/hybrid_3_hns-400x200.jpg)
How to unlock a resilient hybrid work plan
Brivo released a report which reveals that cloud-based access control and high-quality physical security data are paramount when it comes to unlocking a resilient hybrid work …
![shark](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095053/shark-400x200.jpg)
The biggest security threats to today’s businesses
While 94% of CIOs acknowledge some form of serious threat over the next 12 months, only 27% list business continuity and resilience as a top-three priority during the next 12 …
![People](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/07132926/people_work-400x200.jpg)
Enterprises are engaged in a powerful battle to retain cybersecurity staff
The Great Resignation is plaguing industries across the board—but it’s especially challenging within in-demand fields like cybersecurity. According to ISACA’s survey report, …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093232/shield1-400x200.jpg)
The importance of ramping up digital forensics and incident response tech investments
Magnet Forensics announced the release of an IDC survey which revealed that more than half of the respondents are expecting to make major investments in digital forensics and …
![zero](https://img.helpnetsecurity.com/wp-content/uploads/2019/02/09095247/zero-400x200.jpg)
What’s holding back zero trust implementation for device access?
A study by Infinipoint has revealed a significant gap between a high level of interest in zero trust for device access yet relatively low adoption due to obstacles in …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101613/cloud-1-400x200.jpg)
As breaches soar, companies must turn to cloud-native security solutions for protection
Over the past two years, companies’ adoption of public cloud services has surged, but fast-paced change and weaker security controls have led to an increase in data breaches, …
![Audit](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/04145232/audit-400x200.jpg)
The challenges audit leaders need to look out for this year
Attracting talent with nontraditional skills to audit is the top challenge for audit leaders this year, according to Gartner. A July 2021 survey of 166 audit leaders revealed …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111153/future-400x200.jpg)
CIOs’ growing responsibilities going beyond IT
A new global research study from Lenovo reveals how the CIO role has evolved, shedding light on growing areas of responsibility and increasing influence in the C-Suite, as …
![cyber insurance](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08133531/cyber_insurance-yellow-400x200.jpg)
How the increase in ransomware has impacted the cyber insurance market
Panaseer shares data on actions enterprises are willing to take to solve the escalating cyber insurance crisis. In recent years the cyber landscape has been dominated by a …
![](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095600/kubernetes-400x200.jpg)
The value of running stateful applications on Kubernetes
A survey by ionir shows that 60% of respondents are running stateful applications on Kubernetes, and of those who aren’t already, 50% plan to do so in the next 12 …
![payment card](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113353/payment-card-400x200.jpg)
Payment fraud attack rate across fintech ballooned 70% in 2021
Sift released a report, detailing the increasingly sophisticated — and often automated — tactics cybercriminals leverage to commit payment fraud. Derived from a global network …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?