Cyberbit Crisis Simulator enables organizations to prepare for cyber crisis scenarios
Cyberbit has added a collaborative Cyber Crisis Simulator to its platform and offers integrated exercises for the boardroom and the SOC, enabling the C-Suite to collaborate with its cyber defense team in real-time, while responding to an organization.....»»
Compound metalens achieves distortion-free imaging with wide field of view
In a recent study, researchers have developed a compound metalens that enables distortion-free imaging. The study, published in Engineering, presents a novel approach to on-demand distortion engineering using compound metalenses......»»
Mechanical metamaterial enables long-distance component interaction for unique stretching properties
Metamaterials are artificial materials that do not occur in nature. Their components function like atoms in conventional materials but have special optical, electrical and magnetic properties. Interaction between the components is crucial to a metama.....»»
IBM announces Autonomous Security for Cloud
IBM announced Autonomous Security for Cloud (ASC), an AI-powered solution from IBM Consulting designed to automate cloud security management and decision-making to help mitigate risk for organizations accelerating their cloud journey on Amazon Web Se.....»»
Cyber crooks push Android malware via letter
Cyber crooks are trying out an interesting new approach for getting information-stealing malware installed on Android users’ smartphones: a physical letter impersonating MeteoSwiss (i.e., Switzerland’s Federal Office of Meteorology and Cl.....»»
USX Cyber strengthens phishing defense in GUARDIENT XDR
USX Cyber released advanced phishing protection tools within its GUARDIENT XDR platform. This latest enhancement enables organizations to strengthen defenses against sophisticated phishing attacks by providing employees with realistic training and h.....»»
Bitsight acquires Cybersixgill to help organizations manage cyber exposure
Bitsight announced it has signed a definitive agreement to acquire Cybersixgill, a global cyber threat intelligence (CTI) data provider. Together, Bitsight and Cybersixgill will provide visibility into an organization’s external attack surface,.....»»
NIST report on hardware security risks reveals 98 failure scenarios
NIST’s latest report, “Hardware Security Failure Scenarios: Potential Hardware Weaknesses” (NIST IR 8517), explores the hidden vulnerabilities in computer hardware, a domain often considered more secure than software. The report hig.....»»
New infosec products of the week: November 15, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, BlackFog, Eurotech, Nirmata, Rakuten Viber, Syteca, and Vectra. Eurotech ReliaGATE 15A-14 enables organizations to meet regulatory standar.....»»
A strategy of ligand-protected direct hydrogen reduction to prepare bimetallic cluster catalysts
Researchers have developed a ligand-protected direct hydrogen reduction strategy to prepare zeolite-confined Pt-Pd bimetallic cluster catalysts. These catalysts efficiently facilitate hydrogen production from ammonia borane (AB) solvolysis and the ta.....»»
Let African Communities Manage Their Climate Adaptation Plans
Outside groups often offer their solutions for climate adaptation in Africa. But the best people to manage the climate crisis are the people in those communities themselves. For climate adaptation to succeed in Africa, let communities and local leade.....»»
Dreading your RTO commute? Spare a thought for workers in these states
By Amanda Kavanagh As Amazon staff prepare for a full return-to-office on January 2nd, and Bezos-owned The Washington Post begins phasing in its own RTO … The post Dreading your RTO commute? Spare a thought for workers in these states appeared.....»»
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the atta.....»»
Red Hat Enterprise Linux 9.5 helps organizations simplify operations
Red Hat announced Red Hat Enterprise Linux 9.5. Red Hat Enterprise Linux helps organizations deploy applications and workloads more quickly and with greater reliability, enabling them to lower costs and more effectively manage workloads across hybrid.....»»
Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage
Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide should prepare for. The report delivers insights into the tactics of cyber a.....»»
Early Black Friday Lenovo Laptop deals 2024: 20% off the best Lenovo Laptops
All kinds of Lenovo laptops are on sale for Cyber Monday, so whether you're a student, a work-from-home employee, or a gamer, there's an offer waiting for you......»»
Apple updates Logic Pro for Mac and iPad with Quantec Room Simulator
Apple on Wednesday released a major update to Logic Pro, its professional audio workstation software. Both Mac and iPad versions of Logic Pro are getting multiple new features, including a Quantec Room Simulator and improvements to Sound Browser on i.....»»
Valencia floods: How to prevent a natural disaster from becoming a public health crisis
On 29 October, the unthinkable happened to thousands of people in the province of Valencia—in a matter of minutes, they went from going about their daily lives to being submerged or swept away by floodwaters, with many losing everything they own. A.....»»
Cequence Security enables organizations to elevate their API defenses
Cequence Security announced its new API Security Assessment Services. Designed to provide immediate, actionable insights into API security risks, these time-bound and fixed services leverage Cequence’s advanced Unified API Protection platform, enab.....»»
Splunk expands observability portfolio to provide organizations with deeper business context
Splunk announced innovations across its expanded observability portfolio to empower organizations to build a leading observability practice. These product advancements provide ITOps and engineering teams with more options to unify visibility across t.....»»
Syteca Account Discovery strengthens privileged access management
Syteca launched Account Discovery, a new feature within its Privileged Access Management (PAM) solution. This enhancement enables organizations to automatically detect and manage privileged accounts across their IT infrastructure, significantly reduc.....»»