Cisco enhances its security portfolio to protect organizations against the wide array of adversaries
Cisco announced new capabilities across its security portfolio so teams can be more productive and protected wherever they are working from. The end-to-end platform will safeguard users, devices and applications across public clouds and private data.....»»
Addressing online gender violence requires both culture and policy change
More and more of our lives are being spent on digital platforms. And, as we spend more time online, we are more vulnerable to a wide range of risks. This fact is particularly true for women and girls......»»
Israeli orgs targeted with wiper malware via ESET-branded emails
Attackers have tried to deliver wiper malware to employees at organizations across Israel by impersonating cybersecurity company ESET via email. The phishing email The attack took the form of a phishing email ostensibly sent by the “Eset Advanc.....»»
Microsoft lost some customers’ cloud security logs
Microsoft has lost several weeks of cloud security logs that its customers rely on to spot cyber intrusions. What happened As reported by Business Insider earlier this month, Microsoft privately notified affected customers of this incident and told t.....»»
New fabrication strategy enhances graphene aerogel sensitivity and durability for human-machine interfaces
In recent years, researchers have synthesized various new materials that could be used to develop more advanced robotic systems, devices and human-machine interfaces. These materials include graphene aerogels, ultralight, porous and graphene-based ma.....»»
Proton unveils new business VPN features
It's never been easier to protect your business, with new features from Proton VPN......»»
CyCognito expands automated testing capabilities
CyCognito announced several enhancements to its CyCognito Automated Security Testing (AST) product, a module in the CyCognito platform built for automated exposure validation and security testing. These additions speed the configuration of automated.....»»
Building in security without putting the brakes on application development
Building in security without putting the brakes on application development.....»»
New infosec products of the week: October 18, 2024
Here’s a look at the most interesting products from the past week, featuring releases from ExtraHop, GitGuardian, Nametag, Okta, Rubrik, and Sectigo. GitGuardian Visual Studio Code extension helps developers protect their sensitive information GitG.....»»
Cybercrime’s constant rise is becoming everyone’s problem
Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced, forcing organizations to constantly adapt their defenses. The rise of deepfake technology, especially in creating.....»»
Despite massive security spending, 44% of CISOs fail to detect breaches
Despite global information security spending projected to reach $215 billion in 2024, 44% of CISOs surveyed reported they were unable to detect a data breach in the last 12 months using existing security tools, according to Gigamon. Blind spots under.....»»
iPhone 16 and iOS 18 could spur a new wave of Android switchers
At this point, you’ve probably read a lot about the iPhone 16 and iPhone 16 Pro. You don’t need me to recap new features like the Camera Control, bigger screens, upgraded Ultra Wide camera, or better battery life. I’ll offer some of those thoug.....»»
Security Bite: Hackers are now directing users to Terminal to bypass Gatekeeper in macOS Sequoia
9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art App.....»»
How iPhone 16 and iOS 18 could spur a new wave of Android switchers
At this point, you’ve probably read a lot about the iPhone 16 and iPhone 16 Pro. You don’t need me to recap new features like the Camera Control, bigger screens, upgraded Ultra Wide camera, or better battery life. I’ll offer some of those thoug.....»»
We splashed around for 250+ hours to find the best waterproof Bluetooth speakers
Bluetooth speakers are as popular now as they have ever been, and it seems like every tech company on the planet sells a wide range … The post We splashed around for 250+ hours to find the best waterproof Bluetooth speakers appeared first on BG.....»»
Feds test whether existing laws can combat surge in fake AI child sex images
Kids defenseless against AI-generated sex images as feds expand crackdown. Cops aren't sure how to protect kids from an ever-escalating rise in fake child sex abuse imagery fueled.....»»
Android 15’s security and privacy features are the update’s highlight
New tools aim at phone snatchers, snooping kids or partners, and cell hijackers. Android 15 started rolling out to Pixel devices Tuesday and will arrive, through various third-par.....»»
New technique enhances precision in measuring short-lived atomic nuclei
Researchers at the Heavy Ion Research Facility in Lanzhou (HIRFL-CSR) have introduced a technique, Tune-IMS, designed to improve the precision of isochronous mass spectrometry (IMS) in measuring short-lived atomic nuclei. The development offers refin.....»»
Instagram protects teens from sextortion; working on Social Library feature
Instagram is introducing new measures to protect teens from sextortion, by making it harder for criminals to blackmail them. Separately, it appears to be working on a new Social Library feature intended to make it easier to find posts you’ve sha.....»»
Aquaculture could harm animal welfare or protect it, depending on what species the farms raise
The global aquaculture industry has tripled in size since the year 2000, with producers raising a mind-boggling diversity of species, from seaweeds and clams to carp, salmon and cuttlefish. Many of these creatures are undomesticated and lead complex.....»»
Business expert explores strategies for supporting women in leadership, curbing bias
Women and minority leaders who reach senior executive positions often face more intense scrutiny, and research has recommended organizations provide critical stakeholders with information about a leader to reduce negative biases......»»