![Google](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27104125/google-eye2-400x200.jpg)
Google report shows CISOs must embrace change to stay secure
Google’s latest report, conducted in partnership with Hypothesis Group, reveals a stark reality for organizations: incremental security measures are no longer …
![Vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/17164813/vulnerability-1500-1-400x200.webp)
Critical vulnerabilities persist in high-risk sectors
Finance and insurance sectors found to have the highest number of critical vulnerabilities, according to Black Duck. Finance and insurance industry faces highest …
![risk management](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/11093924/riskmanagement-1400-1-400x200.jpg)
How cybersecurity failures are draining business budgets
Security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to …
![online fraud](https://img.helpnetsecurity.com/wp-content/uploads/2024/09/19131950/online_fraud-1500-400x200.webp)
Social engineering scams sweep through financial institutions
North American financial institutions fielded 10 times more reports of social engineering scams in 2024 than they did a year ago, according to BioCatch. The data shows scams …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/10/16113940/ai-1500-face-400x200.webp)
How human ingenuity continues to outpace automated security tools
10% of security researchers now specialize in AI technology as 48% of security leaders consider AI to be one of the greatest risks to their organizations, according to …
![cyber risks](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15162333/cyber_risks-1500-400x200.webp)
Why AI-enhanced threats and legal uncertainty are top of mind for risk executives
AI-enhanced malicious attacks are the top emerging risk for enterprises in the third quarter of 2024, according to Gartner. Key emerging risks for enterprises It’s the third …
![video data breaches](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/11141416/video-data_breaches-400x200.jpg)
Identity-related data breaches cost more than average incidents
Identity-related data breaches are more severe and costly than run-of-the-mill incidents, according to RSA. 40% of respondents reported an identity-related security breach. Of …
![breach](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/07153034/breach-attack-1400-400x200.jpg)
AI learning mechanisms may lead to increase in codebase leaks
The proliferation of non-human identities and the complexity of modern application architectures have created significant security challenges, particularly in managing …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/03083344/eye-400x200.webp)
Strong privacy laws boost confidence in sharing information with AI
53% of consumers report being aware of their national privacy laws, a 17-percentage point increase compared to 2019, according to Cisco. Informed consumers are also much more …
![vulnerability](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/19165750/vulnerability-1400-400x200.jpg)
50% of financial orgs have high-severity security flaws in their apps
Security debt, defined for this report as flaws that remain unfixed for longer than a year, exists in 76% of organizations in the financial services sector, with 50% of …
![China](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/09132937/china-400x200.webp)
Sophos mounted counter-offensive operation to foil Chinese attackers
Sophos conducted defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter …
![problem](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16145607/problem2-400x200.jpg)
99% of CISOs work extra hours every week
The most common challenge for CISOs is resource constraints: not enough staff, budget or technology to support the security program needed or meet compliance requirements, …
Featured news
Resources
Don't miss
- GUI frontends for GnuPG, the free implementation of the OpenPGP standard
- Juniper enterprise routers backdoored via “magic packet” malware
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks