Adapting authentication to a cloud-centric landscape
In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote workforces, the negative consequences of ineffective authorization, and ho.....»»
A landscape of consciousness: Neurophysiologist presents diverse theories and taxonomy of proposed solutions
"Out of meat, how do you get thought? That's the grandest question." So said philosopher Patricia Churchland to Robert Lawrence Kuhn, the producer and host of the acclaimed PBS program, Closer to Truth......»»
Lost Silk Road Cities Discovered High in the Mountains of Central Asia
On the Silk Road, these lost twin cities may have sustained themselves in a foreboding landscape with metallurgy and commerce.....»»
ExtremeCloud Universal ZTNA enhancements boost visibility and security
Extreme Networks introduced new features within ExtremeCloud Universal Zero Trust Network Access (ZTNA), an identity-based network access solution. Universal ZTNA unifies cloud Network Access Control and ZTNA in a single, easy-to-use SaaS offering, w.....»»
Apple will pay up to $1M to anyone who hacks its AI cloud
Apple is challenging security researchers to try and hack its AI cloud, and there's a huge bounty up for grabs......»»
The AI future demands a democratized cloud
The AI future demands a democratized cloud.....»»
NASA Satellite Inspects Strange-Looking Cloud That Always Forms in Same Spot
NASA Satellite Inspects Strange-Looking Cloud That Always Forms in Same Spot.....»»
New infosec products of the week: October 25, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Fastly, IBM, Ivanti, Kusari, and Nucleus Security. IBM Guardium Data Security Center protects hybrid cloud and AI IBM Guardium Data Security Center provides.....»»
Apple offers Private Cloud Compute up for a security probe
Apple advised at launch that Private Cloud Compute's security will be inspectable by third parties. On Thursday, it fulfilled its promise.The virtual environment for testing Private Cloud Compute - Image credit: AppleIn July, Apple introduced Apple I.....»»
Apple shares Private Cloud Compute resources for researchers, expands Bug Bounty rewards
When it announced Apple Intelligence at WWDC in June, Apple also detailed its new Private Cloud Compute platform. At the time, Apple said it would allow independent experts to verify its claims around security and privacy. Ahead of the Apple Inte.....»»
Fortinet FortiManager flaw exploited in zero-day attacks (CVE-2024-47575)
Fortinet has finally made public information about CVE-2024-47575, a critical FortiManager vulnerability that attackers have exploited as a zero-day. About CVE-2024-47575 CVE-2024-47575 is a vulnerability stemming from missing authentication for a cr.....»»
Google’s AI detection tool is now available for anyone to try
Google's DeepMind division announced Wednesday that is releasing its SynthID AI content authentication system for general public use......»»
Adapting generative AI for the next generation of learning
A new study by Monash University learning analytics researchers presents key considerations for generative AI (GenAI) educational tools so they are carefully developed to support, rather than replace, human learning......»»
Stream.Security raises $30 million to boost cloud security
Stream.Security closed a $30 million Series B funding round led by U.S. Venture Partners, with participation from new investors, Citi Ventures, and existing investors, Energy Impact Partners (EIP), Cervin Ventures, TLV Partners, and Glilot Capital Pa.....»»
Evolving cloud threats: Insights and recommendations
Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by leveraging adversary-in-the-middle (AITM) attacks to bypass multi-factor auth.....»»
IBM Guardium Data Security Center protects hybrid cloud and AI
As hybrid cloud-, AI-, and quantum-related risks upend the traditional data security paradigm, IBM is launching IBM Guardium Data Security Center – allowing organizations to protect data in any environment, throughout its full lifecycle, and with.....»»
SailPoint Machine Identity Security reduces the risk associated with unmanaged machine identities
SailPoint launched SailPoint Machine Identity Security, a new Identity Security Cloud product. SailPoint Machine Identity Security is a dedicated product built specifically for machine accounts such as service accounts and bots. Built on SailPoint At.....»»
Internet fiber optic cables successfully detect shock waves from a rockslide
On the night of 16 June 2023, about 1.2 million cubic meters of rock rumbled down into the valley near Brienz (GR). A team from the Swiss Federal Institute for Forest, Snow and Landscape Research WSL and ETH Zurich tracked the event using an unusual.....»»
Basecamp-maker 37Signals says its “cloud exit” will save it $10M over 5 years
Co-founder thinks other companies should consider a "swim against the stream." 37Signals is not a company that makes its policy or management decisions quietly. The productivity s.....»»
Single-molecule imaging reveals aberrant DNA-binding dynamics of cancer-linked chromatin remodelers
Biophysical chemists from the National University of Singapore (NUS) have uncovered a previously hidden landscape that governs the intracellular organization and dynamics of SWI/SNF chromatin remodelers, an important class of protein complexes that c.....»»
Microsoft lost some customers’ cloud security logs
Microsoft has lost several weeks of cloud security logs that its customers rely on to spot cyber intrusions. What happened As reported by Business Insider earlier this month, Microsoft privately notified affected customers of this incident and told t.....»»