Help Net Security
2 million malicious emails bypassed secure email gateways in 12 months
Two million malicious emails bypassed traditional email defenses, like secure email gateways, between July 2020-July 2021, according to data from Tessian. Who’s being targeted …
Whole cloud spending to surpass $1.3 trillion by 2025
Over the past decade, cloud computing has become the foundation for the delivery of mobile and content services as well as an alternative to traditional enterprise computing …
Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings
Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching …
Industry trends and insights of CISOs around the world
Marlin Hawk released a research report which explores industry trends and insights of CISOs around the world, the challenges they face in the cybersecurity landscape, as well …
77% of execs concerned about security tools gaps in their company
77% of Americans believe their company has gaps in its current security tools, according to Lynx Software survey findings. 500 Americans in managerial and executive roles were …
Organizations prioritize strategic security programs, but lack fundamentals
Organizations are prioritizing strategic security programs but missing the foundational capabilities they need to make meaningful changes to their security posture, a …
Office workers unwilling to change their behavior, despite being aware of the cybersecurity challenges
Despite office workers being aware of the cybersecurity challenges faced by their employer – especially when it comes to hybrid working – many admit to high risk …
3-D Secure transactions growth fueled by card-not-present explosion and PSD2
A massive $100 billion in transactions in 2021 alone have been protected by 3-D Secure payments authentication technology, Outseer reveals. The report also reveals continued …
How to retain the best talent in a competitive cybersecurity market
We are currently experiencing The Great Resignation, where millions of people are leaving their jobs in search of increased satisfaction. The global pandemic gave many the …
What businesses need to know about data decay
Data decay is the aging and obsolescence of data in such a way that makes it no longer usable due to loss of its integrity, completeness, and accuracy. Data that can no longer …
Zero trust security solutions widely adopted, spurred by surge in ransomware
Over a decade after the zero trust security concept was first introduced, Ericom’s survey results indicate that zero trust solutions are being widely adopted. Spurred by the …
Ransomware still a primary threat as cybercriminals evolve tactics
Trend Micro announced that it blocked 40.9 billion email threats, malicious files, and malicious URLs for customers in the first half of 2021, a 47% year-on-year increase. …
Featured news
Resources
Don't miss
- Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)
- Brutus: Open-source credential testing tool for offensive security
- Why secure OT protocols still struggle to catch on
- Edge computing’s biggest lie: “We’ll patch it later”
- Cyber risk is becoming a hold-period problem for private equity firms