![](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092916/code1-400x200.jpg)
70% of organizations recognize the importance of secure coding practices
A research from Secure Code Warrior has revealed an attitudinal shift in the software development industry, with organizations bucking traditional practices for DevOps and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195815/dollar-943737_1280-400x200.jpg)
Financial services and insurance faring better than most in the pandemic year
While 2020 was one of the most challenging years for every business, those in financial services and insurance have fared better than most. This is the conclusion of a deeper …
![find](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094457/find-400x200.jpg)
Challenges and benefits of using threat data feeds
Threat data feeds can help organizations strengthen their cybersecurity posture, according to a report from the Ponemon Institute. As cyberthreats proliferate, many …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/18150523/hands-data-security-400x200.jpg)
Distributed and remote work creating a perfect storm for network security teams
Distinct priorities have emerged when it comes to responding to the needs of IT security’s rapid transformation, a FireMon research has found. The survey of 500 cybersecurity …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095920/network2-400x200.jpg)
Continued WAN and application growth resulting in network complexity
The WAN continues to extend its growth, with the number of enterprises connecting to over 100 inter-regional sites growing by 50%, from 19% in 2020 to 28% in 2021, according …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194518/brain-400x200.jpg)
61% of businesses say competitive intelligence has made a direct impact on revenue
61% of businesses say competitive intelligence has made a direct impact on revenue — a 17% increase over last year’s figure of 52%, a Crayon report reveals. Competitive …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093628/identity_theft-400x200.jpg)
Remote workers admit to playing a significant part in increasing their company’s cybersecurity risks
The COVID-19 generation of remote workers are admitting to playing a significant part in increasing the cybersecurity risks facing their companies. An Opinium research shows …
![Work](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/19140648/work-home-400x200.jpg)
IT leaders adapting to new challenges by prioritizing collaboration, cloud and security
CIOs and IT decision makers (ITDMs) are looking to maximize investments and drive innovation after a difficult year which raised the profile of IT leaders in driving critical …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194237/code-400x200.jpg)
80% of security leaders would like more control over their API security
There are major gaps in API security based on insights from over 100 senior security leaders at large enterprises in the United States and Europe, an Imvision report reveals. …
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/17123146/healthcare-attack-heart-400x200.jpg)
Data breaches and network outages: A real and growing cost for the healthcare industry
One year into the COVID-19 pandemic, the Infoblox report reveals major challenges the healthcare industry faced as IT workers scrambled to secure protected health information …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Cybercriminals capitalizing on our reliance on the cloud
90% of cyberattacks on cloud environments in the last 12 months involved compromised privileged credentials, according to a research from Centrify. Most cloud environments …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101141/tools2-400x200.jpg)
Rapid increase in security tools causing alert fatigue and burn out
On average, enterprises maintain 19 different security tools, with only 22% of such tools serving as vital to primary security objectives, a ReliaQuest survey reveals. The …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?