Achieving peak cyber resilience
Climbing Mount Everest isn’t a feat for the faint hearted. Extreme weather, dangerous terrain and acclimatization requirements make the trek challenging for even the most experienced climbers. It’s estimated that the expedition takes more than tw.....»»
The changes in the cyber threat landscape in the last 12 months
When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. Europol’s recently released Internet Organised Crime Threat Assessment (.....»»
Cyber insurance 2.0: The systemic changes required for future security
Digitalization has evolved into a systemic risk for organizations – and, therefore, cyber insurers. With the global cost of cybercrime skyrocketing, something has to change. In this Help Net Security video, Vishaal Hariprasad, CEO at Resilience, di.....»»
Global cyber event affects dealership groups, suppliers
A technology stoppage, which crashed Microsoft Windows computer systems worldwide, stemmed from trouble with a software update from cybersecurity provider CrowdStrike Holdings Inc......»»
Cooling must be seen as critical national infrastructure, new report says
A Cranfield University academic has contributed to a new landmark report that says that governments and policy makers must recognize cooling as critical national infrastructure (CNI) if humanity is to build resilience to the impact of climate change......»»
New insights into interfacial hydrogen bonds could enhance photocatalytic hydrogen evolution
Photocatalytic hydrogen evolution from water is a key technology for achieving sustainable hydrogen production. However, the direct impact of the microscopic structure of interfacial water molecules on photocatalytic reactivity remains unexplored......»»
CISOs must shift from tactical defense to strategic leadership
Cyber threats are advancing quickly in size and sophistication, largely because of the rapid evolution of technology, increasing sophistication of cyber attackers, and the expansion of attack surfaces through interconnected systems and devices, accor.....»»
Scientists develop novel iontronic skin with excellent self-healing efficiency and sensitivity
Researchers led by Prof. Zhu Jin at the Ningbo Institute of Materials Technology and Engineering (NIMTE) of the Chinese Academy of Sciences have developed a novel mechano-responsive elastomer, i-DAPU, achieving high-performance iontronic skin that in.....»»
Waterfall Security HERA secures OT environments
Waterfall Security launched HERA – Hardware Enforced Remote Access, a new technology designed to enable safe and secure remote access into cyber-physical systems and OT networks. HERA allows organizations to reap the operational and economical.....»»
Leafy greens grown by night prove cheaper and just as good
Utility companies offer flexible electricity rates depending on the time of day to reduce demand at peak hours. That way, consumers can save some money, say, by using the dishwasher or tumble dryer at night. And the utilities avoid the need for massi.....»»
Attributing Canada"s June heat wave to climate change is an important step in adapting to a warmer world
This June saw major heat waves across Canada with peak temperatures—measured over a three-day period—of 7.4°C in eastern Ontario, 10.7°C in southern Québec, 7.2°C in northern Québec and 10.6°C in Atlantic Canada. On June 19, more than 100 l.....»»
Defect engineering leads to designer catalyst for production of green hydrogen
Efficient technology for splitting the hydrogen–oxygen bond in water could be the key to producing low-cost, green hydrogen for energy storage at an industrial scale. Green hydrogen is expected to play a significant role in achieving the U.S. Depar.....»»
Druva unveils data security capabilities to accelerate incident response
Druva announced new capabilities to help its customers accelerate the investigation and remediation of cyber threats. The new Threat Hunting capability empowers IT and security teams to search their global data footprint for indicators of compromise.....»»
Paris 2024 Olympics to face complex cyber threats
While previous Olympic games have faced cybersecurity threats, the Games of the XXXIII Olympiad, also known as Paris 2024, will see the largest number of threats, the most complex threat landscape, the largest ecosystem of threat actors, and the high.....»»
Land protection initiatives reduced Amazon deforestation by up to 83%, new analysis finds
A new analysis shows that land protection initiatives in the Brazilian Legal Amazon (BLA) reduced deforestation by up to 83% between 2000 and 2010. Such impressive results highlight the vital role of land protection policies in achieving ambitious go.....»»
BlueVoyant Cyber Defense Platform helps organizations reduce cyber risk
BlueVoyant unveiled its innovative Cyber Defense Platform. The platform integrates internal, external, and supply chain defense solutions into a single, cloud-native platform designed to measure and strengthen cyber defense posture in a cost-effectiv.....»»
Managing cyberattack fallout: Financial and operational damage
In this Help Net Security, Ashley Harrington, Director of Cybersecurity at Aspida, discusses the impact of cyberattack on business operations and financial health. Beyond immediate disruptions and financial burdens, cyber incident can severely damage.....»»
Black Americans develop mental resilience to discrimination early
No one likes to feel like they're not getting the respect or courtesy they deserve. Think about the last time you felt patronized, or treated as inferior, or received worse customer service than another person in line......»»
Command Zero emerges from stealth with $21 million in seed funding
Command Zero emerged from stealth with $21 million in seed funding, led by Andreessen Horowitz with participation from Insight Partners and over 60 cyber industry thought leaders and executives. Using encoded expert knowledge, automation and advanced.....»»
IT-Harvest incorporates security scores from Black Kite into its dashboard
IT-Harvest announced the integration of Black Kite‘s cyber third-party risk intelligence into the IT-Harvest Dashboard. This collaboration provides users with a detailed view into cyber third-party risk for more than 3,900 cybersecurity vendors.....»»
How to Build a Hurricane-Proof House
In the face of longer hurricane seasons filled with more powerful storms, homeowners are turning to new designs and stronger materials to ensure the resilience of their property......»»