A macro look at the most pressing cybersecurity risks
Forescout’s 2024H1 Threat Review is a new report that reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. “Attackers are looking for any weak point to bre.....»»
Climate change as unjust enrichment: A new legal framework for climate litigation
The climate crisis stands as the most pressing challenge of our generation, yet effective legal responses remain elusive. Political polarization and the influence of special interest groups have stalled meaningful regulatory action on both national a.....»»
Plastic in the ocean and on our plates: What are the risks to human health?
It's no secret: when we savor a delicious piece of fish or a platter of seafood, we're not just consuming valuable omega-3s and vitamin D. Alongside these benefits come less appetizing elements—countless micro- and nano-plastics......»»
Contentious COP29 deal casts doubt over climate plans
A bitterly-fought climate finance deal reached at COP29 risks weakening emissions-cutting plans from developing countries, observers say, further raising the stakes for new national commitments due early next year......»»
Effects of extreme weather events on soil microbes shed light on climate change risks
New research has revealed how tiny soil microbes are impacted by extreme weather events, offering new insights into the risks posed by climate change......»»
Submarine canyon plastic accumulation is driven by turbidity currents, simulation study shows
Plastic pollution is an ever-pressing concern for the health of our ocean ecosystems and their inhabitants, with estimates of over 10 million metric tons of plastic litter entering the marine realm each year. While evocative images often highlight su.....»»
Hottest cybersecurity open-source tools of the month: November 2024
This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. ScubaGear ScubaGear is an open-source tool the Cybersecurity and Infrastructure Security Ag.....»»
Supply chain managers underestimate cybersecurity risks in warehouses
32% of warehouse respondents report that social engineering is one of the most-used entry points in warehouse cyberattacks – tied with software vulnerabilities (32%) and followed by devices (19%), according to Ivanti. Cyberattacks on warehouses thr.....»»
Cybersecurity jobs available right now: November 26, 2024
Application Security Engineer Agoda | UAE | Hybrid – View job details As an Application Security Engineer, you will develop and design application-level security controls and standards. Perform application security design reviews agai.....»»
Practical strategies to build an inclusive culture in cybersecurity
In this Help Net Security interview, Alona Geckler, Chief of Staff, SVP of Business Operations at Acronis, shares her insights on the diversity environment in the cybersecurity and IT industries. She discusses the progress made over the past two deca.....»»
Broadcast police communications may pose privacy risks, especially to Black men
Police radio transmissions contain personally identifiable information that could pose privacy risks for members of the public, especially Black males, according to a new study by researchers at Penn State and the University of Chicago......»»
Researchers investigate health risks of potentially toxic elements in surface water in Tarim River Basin, China
Potentially toxic elements (PTEs) in surface water in arid areas can pose a serious threat to natural environment and human health......»»
Infrastructure and communication challenges can be barriers to food safety in the low-moisture food industry
Low-moisture foods such as dried fruits, seeds, tree nuts and wheat flour were once considered to carry minimal microbial risks. However, the increased number of outbreaks linked to bacteria-contaminated low-moisture foods has resulted in product rec.....»»
Lenovo introduces ThinkShield Firmware Assurance
Lenovo introduced ThinkShield Firmware Assurance as part of its portfolio of enterprise-grade cybersecurity solutions. ThinkShield Firmware Assurance is one of the only computer OEM solutions to enable deep visibility and protection below the operati.....»»
Full recovery from breaches takes longer than expected
In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated timeline of 5.9 months, according to Fastly. Cybersecurity leaders feel unprepa.....»»
Light-based photocatalytic system can break down PFAS at room temperature
Researchers at Colorado State University have found a new approach for breaking down PFAS—a group of human-made "forever" chemicals commonly used for their water-resistant properties that can carry health risks from long-term exposure......»»
Quantum DXi9200 helps organizations manage and reduce cybersecurity risks
Quantum announces the DXi9200, the latest generation of its flagship DXi9000 Series hybrid (flash + dense disk) data protection appliances, designed for scalable, efficient backup and recovery services for large organizations. With the continuing thr.....»»
Smoke changes over time and distance, but health risks remain
A study of air quality in New York City while it was heavily affected by Canadian wildfire smoke revealed that multi-day transport to the New York region significantly transformed the smoke, but serious health risks remained. The results are publishe.....»»
Cybersecurity jobs available right now: November 20, 2024
Application Security Engineer ENOC | UAE | On-site – View job details As an Application Security Engineer, you will establish and maintain DLP policies to prevent unauthorized access, transmission, or disclosure of sensitive data, foc.....»»
The hidden disease risks of modern housing developments in rural Africa
Tamika Lunn went to Kenya looking for bats. Her task, as a postdoctoral researcher in the lab of U of A biologist Kristian Forbes, was to catch bats to understand if, when and why they carried viruses. A spillover of a bat virus to humans could lead.....»»
Dev + Sec: A collaborative approach to cybersecurity
The age-old tension between development and security teams has long been a source of friction in organizations. Developers prioritize speed and efficiency, aiming to deliver features and products quickly with a fast-paced, iterative development cycle.....»»