![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
How ready are federal agencies for zero trust implementation?
More than 70 percent of federal agencies are aggressively adopting zero trust principles, while another 26 percent are adopting where they feel it makes sense, according to a …
![Shark](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/27103738/shark-vuln-400x200.jpg)
Top attack trends every organization should build resilience against
Expel announced the release of the cybersecurity trends and predictions for 2022. Based on aggregated data from its security operations center (SOC), the report provides …
![work](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093819/work-400x200.jpg)
Understaffing persistently impacting enterprise privacy teams
A research from ISACA explores the latest trends in enterprise privacy — from privacy workforce and privacy by design to privacy challenges and the future of privacy. The …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112510/hole-400x200.jpg)
How costly is an insider threat?
Proofpoint released a report to identify the costs and trends associated with negligent, compromised, and malicious insiders. Notably, on average, impacted organizations spent …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102343/face-400x200.jpg)
Number of data compromises reaching all-time high
According to an Identity Theft Resource Center (ITRC) report, the overall number of data compromises (1,862) is up more than 68 percent compared to 2020. The new record number …
![Trend Micro](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/12121737/trendmicro-research-manufacturing-400x200.jpg)
Manufacturing firms turning to the cloud to increase their business agility
European manufacturing firms are embracing cloud-based technologies and services to accelerate their go-to-market plans and improve digital marketing efforts, according to an …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/27174916/ransomware-hands-400x200.jpg)
Ransomware families becoming more sophisticated with newer attack methods
Ivanti, Cyber Security Works and Cyware announced a report which identified 32 new ransomware families in 2021, bringing the total to 157 and representing a 26% increase over …
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/17123146/healthcare-attack-heart-400x200.jpg)
Healthcare industry most common victim of third-party breaches last year
Black Kite released its annual Third-Party Breach Report, which examines the impact of third-party cyber breaches in 2021. Ransomware was the most common attack method behind …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100655/network-400x200.jpg)
The state of SD-WAN and SASE planning
Aryaka published a report, revealing insights into global SD-WAN and SASE planning. 1,600 information technology (IT) enterprise decision makers across global enterprises …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/01155327/malware_7_01122021-400x200.jpg)
Stealthy Excel malware putting organizations in crosshairs of ransomware gangs
The HP Wolf Security threat research team identified a wave of attacks utilizing Excel add-in files to spread malware, helping attackers to gain access to targets, and …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105434/idea-400x200.jpg)
Proactive software supply chain security becoming critical as threats rise
Anchore released its report of executive insights into managing enterprise software supply chain security practices. The Anchore 2022 Software Supply Chain Security Report …
![medical devices](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/11091922/medical_devices_gradient-400x200.jpg)
53% of medical devices have a known critical vulnerability
After a year of unprecedented ransomware attacks on hospitals and healthcare systems – and with healthcare now the #1 target for cybercriminals – critical medical device risks …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege