Atakama Enterprise protects unstructured data against exfiltration
Atakama unveiled its new Multifactor Encryption platform, Atakama Enterprise, featuring the Atakama Intelligence Center. Atakama’s Multifactor Encryption combines advanced Distributed Key Management (DKM) with the proven concept of multi-device.....»»
NASA"s Deep Space Optical Communications demonstration transmits data over 140 million miles
Riding aboard NASA's Psyche spacecraft, the agency's Deep Space Optical Communications technology demonstration continues to break records. While the asteroid-bound spacecraft doesn't rely on optical communications to send data, the new technology ha.....»»
International dairy science collaboration paves the way for tomorrow"s resilient dairy herds
In a new Journal of Dairy Science study, researchers have increased the quantity and quality of the available data on genetic traits related to feed efficiency and methane emissions.....»»
Psyche spacecraft sends data back to Earth using lasers for the first time
NASA's experimental laser communication system, riding along with the Psyche spacecraft, has transmitted Psyche data from over 140 million miles away......»»
IBM to buy HashiCorp in $6.4 billion cash deal, expanding cloud portfolio
IBM and HashiCorp have entered into a definitive agreement under which IBM will acquire HashiCorp for $35 per share in cash, representing an enterprise value of $6.4 billion. HashiCorp’s suite of products provides enterprises with extensive Inf.....»»
Edgio Client-Side Protection enables organizations to secure critical customer data
Edgio released its Client-Side Protection solution. Designed to monitor scripts and APIs on the browser-side to prevent malicious code from exfiltrating sensitive customer data, Edgio Client-Side Protection allows teams to gain full visibility on cli.....»»
Dropbox announces a number of security and data protection features
Dropbox announced new security, organization, and sharing features to give teams the control, flexibility, and speed to get work done from anywhere. In the modern workplace, teams are spread across locations, time zones, and even different companies,.....»»
Applying DevSecOps principles to machine learning workloads
Protecting data and other enterprise assets is an increasingly challenging task, and one that touches nearly every corner of an organization. As the complexity of digital systems grows, the challenges mount. One method that helps reign in the chaos i.....»»
NASA"s Chandra releases timelapse movies of Crab Nebula and Cassiopeia A
New movies of two of the most famous objects in the sky—the Crab Nebula and Cassiopeia A—are being released from NASA's Chandra X-ray Observatory. Each includes X-ray data collected by Chandra over about two decades. They show dramatic changes in.....»»
How NASA Repaired Voyager 1 From 15 Billion Miles Away
The far-traveled space probe is once again transmitting usable data, after a glitch caused months of gibberish......»»
iPhone activation market share hits new low as Android dominates
CIRP is out with a report on how iPhone activations compare to Android in the US. The latest data shows a notable drop over the last year bringing Apple’s US smartphone market share of new activations back in time six years. more….....»»
Scientists use ancient DNA, historical context to unravel kinship, social practices of Avar society
A multidisciplinary research team led by scientists at the Max Planck Institute for Evolutionary Anthropology has combined ancient DNA data with a clear archaeological, anthropological and historical context to reconstruct the social dynamics of Avar.....»»
New method makes finding bat roosts easier for conservationists
A new algorithm is making it easier for ecologists and conservationists to find bat roost locations—reducing search areas by nearly 375 times their previous size. The technology combines microphone detector data with a bat movement model to identif.....»»
Secureworks enables users to view known vulnerabilities in the context of threat data
Secureworks announced the ability to integrate vulnerability risk context with threat detection to prevent attackers from exploiting known vulnerabilities and expedite response times, improving an organization’s security posture. The integration be.....»»
Netwrix 1Secure enhancements accelerate threat detection
Netwrix released a new version of its IT auditing software-as-a-service (SaaS) solution, Netwrix 1Secure. It enables prompt detection of suspicious activities around data across the Microsoft 365 environment, Entra ID (formerly Azure AD), as well as.....»»
Entrust protects users against fraud, phishing and other account takeover attacks
Entrust announced a single-vendor enhanced authentication solution that integrates identity verification (IDV) and identity and access management (IAM) to fight deepfakes, phishing, account takeover (ATO) attacks and other threats. By enhancing Entru.....»»
Forcepoint DSPM safeguards sensitive information by examining data context and content
Forcepoint has launched Forcepoint Data Security Posture Management (DSPM), driven by AI to deliver real-time visibility, ease privacy compliance and minimize risks for data stored in multi-clouds and networks, including endpoints. Forcepoint DSPM ha.....»»
CMS Collaboration observes new all-heavy quark structures
For over a decade, the CMS Collaboration, a large team of researchers based at different institutes worldwide, has been analyzing data collected at the Compact Muon Solenoid, a general-purpose particle detector at CERN's Large Hadron Collider (LHC)......»»
New algorithm solves century-old problem for coral reef scientists
An algorithm developed by a Florida Tech graduate student creates a new ecological survey method that allows scientists to unlock important historical data from a vast trove of coral-reef photographs dating back more than a century......»»
Stellar Cyber launches MITRE ATT&CK Coverage Analyzer
Stellar Cyber launched the MITRE ATT&CK Coverage Analyzer, enabling users to visualize the impact of data source changes on their ability to detect threats in their specific environments. With this new tool, free of charge to all existing customers,.....»»
Veritas enhances cyber resilience with AI-powered solutions
Veritas Technologies announced artificial intelligence (AI)-powered advancements in Veritas 360 Defense. With the self-defending data protection solution, a generative AI-powered operational copilot and new ecosystem partners, organizations can more.....»»