![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100537/cloud-1-400x200.jpg)
Cloud-native adoption shifts security responsibility across teams
Styra released a research report which explores how in sync, or misaligned, IT leaders and developers are when it comes to cloud-native technology use and security during …
![wolf](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094428/wolf-400x200.jpg)
Trends, threats and techniques that comprised the 2021 threat landscape
Ransomware dominated the threat landscape in 2021, with groups adopting new techniques such as double extortion and “as-a-service” models to evade detection and maximize their …
![hybrid work](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/26090703/hybrid_3_hns-400x200.jpg)
How to unlock a resilient hybrid work plan
Brivo released a report which reveals that cloud-based access control and high-quality physical security data are paramount when it comes to unlocking a resilient hybrid work …
![People](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/07132926/people_work-400x200.jpg)
Enterprises are engaged in a powerful battle to retain cybersecurity staff
The Great Resignation is plaguing industries across the board—but it’s especially challenging within in-demand fields like cybersecurity. According to ISACA’s survey report, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101613/cloud-1-400x200.jpg)
As breaches soar, companies must turn to cloud-native security solutions for protection
Over the past two years, companies’ adoption of public cloud services has surged, but fast-paced change and weaker security controls have led to an increase in data breaches, …
![payment card](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113353/payment-card-400x200.jpg)
Payment fraud attack rate across fintech ballooned 70% in 2021
Sift released a report, detailing the increasingly sophisticated — and often automated — tactics cybercriminals leverage to commit payment fraud. Derived from a global network …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100155/bot-400x200.jpg)
Top 5 myths businesses believe about bots
Netacea announced the results from a new report showing that most businesses do not fully understand the threat bots pose, leaving those organizations vulnerable to threats. …
![Cloud](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/20170619/cloud-target-400x200.jpg)
The problem with multiple cloud security tools: Alert fatigue and burnout
Orca Security released a research report on public cloud security alert fatigue. The survey, held among over 800 IT professionals across five countries and ten industries …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112441/users-400x200.jpg)
How to build and retain a strong IT team
Info-Tech Research Group has released its 2022 trends report on the IT talent market. This research contains insights and strategies on how organizations can incorporate new …
![Terminal](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/26101304/terminal-connect-400x200.jpg)
Attackers have come to love APIs as much as developers
Cequence Security released a report revealing that both developers and attackers have made the shift to APIs. Of the 21.1 billion transactions analyzed in the last half of …
![mobile](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110503/mobile-400x200.jpg)
Severity of mobile threats rising, 10+ million mobile endpoints impacted
Zimperium published a report unveiling new data and comprehensive analysis of the state of mobile security worldwide. In 2021, the Zimperium zLabs team discovered threats …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092947/lock-400x200.jpg)
Attackers using default credentials to target businesses, Raspberry Pi and Linux top targets
Findings from a Bulletproof report highlight the issue posed by poor security hygiene as automated attacks remain a high security threat to businesses. The research gathered …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege