![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101639/connection-400x200.jpg)
Digital transformation investments a top priority for most CFOs
When it comes to digital transformation and its significance amongst other corporate priorities, 80% of CFOs globally cite it is within the top-five of their list of …
![MITRE ATT&CK](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/15120235/mitre-attack-400x200.jpg)
MITRE ATT&CK v9 is out and includes ATT&CK for Containers
The Mitre Corporation has released the ninth version of its ATT&CK knowledge base of adversary tactics and techniques, which now also includes a newly created ATT&CK …
![DLP](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30105541/dlp-400x200.jpg)
How do I select a DLP solution for my business?
Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shift to a remote workforce model, cybersecurity threats have …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092919/code2-400x200.jpg)
Risk-based vulnerability management has produced demonstrable results
Several years ago, risk-based cybersecurity was a largely untested and hotly debated topic. But the tests have since been administered and the debate largely settled: …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110633/ddos-world-400x200.jpg)
DDoS attackers stick to their target even if they are unsuccessful
Link11 has released its DDoS report for Q1 2021 which revealed the number of DDoS attacks continued to grow. Between January and March, more than double the number of attacks …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/20075020/risk-hand-400x200.jpg)
Cybersecurity control failures listed as top emerging risk
Cybersecurity control failures was listed as the top emerging risk in 1Q21 in a global poll of 165 senior executives across function and geography, according to Gartner. …
![cloud money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093749/cloud-money1-400x200.jpg)
How organizations can optimize cloud spend
Although 80% organizations recognize cloud computing as being vital to their financial security, 57% have encountered unexpected costs, according to a study from Aptum. 80% IT …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/21140811/laptop-biohazard-400x200.jpg)
58% of orgs predict remote workers will expose them to data breach risk
35% of UK IT decision makers admitted that their remote workers have already knowingly put corporate data at risk of a breach in the last year according to an annual survey …
![Fraud losses](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/23150627/fraud_losses_red-400x200.jpg)
eCommerce fraud losses to surpass $20 billion this year
The value of losses due to eCommerce fraud will rise this year, from $17.5 billion in 2020 to over $20 billion by 2021; a growth of 18% over a single year, according to a …
![PCI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30112439/pci-ssc-400x200.jpg)
PCI SSC publishes PCI Secure Software Standard 1.1 and supporting program documentation
Version 1.1 of the PCI Secure Software Standard introduces the Terminal Software Module, a new security requirements module for payment software intended for deployment and …
![week in review](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/16094612/week_in_review1-400x200.jpg)
Week in review: QNAP NAS ransomware, threat modeling, the realities of working in cybersecurity
Here’s an overview of some of last week’s most interesting news, articles and interviews: Attackers can teach you to defend your organization against phishing Using the kill …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
Shedding light on the threat posed by shadow admins
Few organizations would purposefully hand a huge responsibility to a junior staff member before letting them fly solo on their own personal projects, but that’s effectively …
Featured news
Sponsored
Don't miss
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege
- Cloud security threats CISOs need to know about