Aim for a modern data security approach
Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Many organizations no lo.....»»
Automakers excoriated by Senators for fighting right-to-repair
OEMs also called out for selling data they collect on drivers. Yesterday, US Senators Jeff Merkley (D-OR), Elizabeth Warren (D-MA), and Joshua Hawley (R-MO) sent letters to the he.....»»
Ferns" ancient resilience aids modern ecosystem recovery after disasters
Scientists have suggested an updated framework for the role of ferns in environmental recovery from disaster. Instead of competing with other organisms, ferns may act as facilitators that ease the way for other plants and animals to re-establish them.....»»
AI-driven approach reveals hidden hazards of chemical mixtures in rivers
Artificial intelligence can provide critical insights into how complex mixtures of chemicals in rivers affect aquatic life—paving the way for better environmental protection......»»
Simulations of hominin Lucy help show how long distance running evolved in modern humans
A team of natural scientists, musculoskeletal specialists, and evolutionary biologists affiliated with several institutions in the U.K., working with a colleague from the Netherlands, has found via simulations, that the famous early hominin Lucy, cou.....»»
ESA and NASA satellites deliver first joint picture of Greenland Ice Sheet melting
Academics from Northumbria University are part of an international research team which has used data from satellites to track changes in the thickness of the Greenland Ice Sheet......»»
Thousands of GPS tracking customers have info leaked following data breach
A bug in Hapn's website is allegedly spilling sensitive information, while the company remains silent......»»
New infosec products of the week: December 20, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, GitGuardian, RunSafe Security, Stairwell, and Netwrix. GitGuardian launches multi-vault integration to combat secrets sprawl GitGuardian unveiled a.....»»
46% of financial institutions had a data breach in the past 24 months
As the financial industry is the most targeted sector for data breaches in 2024, it’s now more important than ever to strengthen the industry moving into 2025, according to SailPoint. Financial institutions face growing cyber threats In 2024, rough.....»»
AI is becoming the weapon of choice for cybercriminals
AI changes how organizations look at cybersecurity GenAI is compromising security while promising efficiency This article highlights key findings from 2024 reports on AI and GenAI technologies, focusing on their potential and major challenges. Overre.....»»
Why cybersecurity is critical to energy modernization
In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresse.....»»
Rumor Replay: Apple’s foldable iPad and iPhone are coming, AirTag 2 and more
This is Rumor Replay, a weekly column at 9to5Mac offering a quick rundown of the most recent Apple product rumors, with analysis and commentary. Today: Apple’s foldable iPad and iPhone are coming, plus a fresh Magic Mouse approach, and AirTag 2. He.....»»
Almost half of developer revenue now comes from subscriptions
Analytics data suggests that we’re downloading fewer iPhone apps this year than last, but spending significantly more money on them. That’s because almost half of developer revenue now comes from subscriptions. App Store downloads declined sli.....»»
Legit Security provides insights into the enterprise’s secrets posture
Legit Security announced enhancements to its secrets scanning product. Available as either a stand-alone product or as part of a broader ASPM platform, Legit released a new secrets dashboard for an integrated view of all findings and recovery actions.....»»
CISA orders federal agencies to secure their Microsoft cloud environments
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments. About the CISA BOD 25-01 directive The Implement.....»»
NASA payload aims to probe moon"s depths to study heat flow
Earth's nearest neighboring body in the solar system is its moon, yet to date, humans have physically explored just 5% of its surface. It wasn't until 2023—building on Apollo-era data and more detailed studies made in 2011–2012 by NASA's automate.....»»
A new way of thinking about skyrmion motion could lead to more robust electronics
The future storage and processing of data stand to benefit greatly from tiny magnetic whirlpools known as skyrmions, which are robust against noise and may be useful in lower power consumption devices. The development of skyrmion-based technologies h.....»»
Advancing a trustworthy quantum era: A novel approach to quantum protocol verification
Quantum computing offers the potential to solve complex problems faster than classical computers by leveraging the principles of quantum mechanics. Significant advancements have been made in areas, such as artificial intelligence, cryptography, deep.....»»
Sentinel-1 data reveals Arctic glacier retreat
As Arctic temperatures rise, marine-terminating glaciers—especially in places like Svalbard—are undergoing rapid retreat and intensified calving. The Space for Shore project utilizes radar data from the Copernicus Sentinel-1 mission to provide pr.....»»
Machine learning offers new framework for heterogeneous catalyst data analysis
Machine learning (ML) transforms the design of heterogeneous catalysts, traditionally driven by trial and error due to the complex interplay of components. BIFOLD researcher Parastoo Semnani from the ML group of BIFOLD Co-Director Klaus-Robert Mülle.....»»
Leadership skills for managing cybersecurity during digital transformation
In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The pos.....»»