Cybersecurity is driving digital transformation in alternative investment institutions
As the alternative investment industry tackles a rapidly changing threat landscape, increased regulation, and a continuous need to innovate, most firms are increasing their DX and security budgets and cite security as critically important to their DX.....»»
ESA and NASA team up to study solar wind
In the run up to April's total solar eclipse, ESA-led Solar Orbiter and NASA-led Parker Solar Probe are both at their closest approach to the sun. Tomorrow (March 29), they are taking the opportunity to join hands in studying the driving rain of plas.....»»
AppViewX partners with Fortanix to address critical enterprise security challenges
AppViewX and Fortanix announced a partnership to offer cloud-delivered secure digital identity management and code signing. Together the companies make it easy to address critical enterprise security challenges with comprehensive, robust and scalable.....»»
Beware of fake CleanMyMac installers that will infect your Mac
Cybersecurity experts recently uncovered a sophisticated scheme where attackers disguise malware as CleanMyMac to steal Mac users' data.MacPaw team finds malware disguised as CleanMyMacMacPaw, the creator of CleanMyMac and other utilities, has a cybe.....»»
Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-24955 – a code injection vulnerability that allows authenticated attackers to execute code remotely on a vulnerable Microsoft SharePoint Server – to its KEV ca.....»»
Mexico delays ban on controversial herbicide
The Mexican government has postponed a ban on the use of glyphosate, saying it has not found an alternative for the controversial weed killer......»»
Debunking compliance myths in the digital era
Despite recent economic fluctuations, the software-as-a-service (SaaS) market isn’t letting up. The industry is set to grow annually by over 18% and be valued at $908.21 billion by 2030. It’s evident the industry is fueled by an increasing relian.....»»
Enterprises increasingly block AI transactions over security concerns
Enterprises must secure a transformation driven by generative AI (GenAI) bidirectionally: by securely adopting GenAI tools in the enterprise with zero trust while leveraging it to defend against the new AI-driven threat landscape, according to Zscale.....»»
Researchers find the more flood driving factors there are, the more extreme a flood is
There are several factors that play an important role in the development of floods: air temperature, soil moisture, snow depth, and the daily precipitation in the days before a flood. In order to better understand how individual factors contribute to.....»»
AU10TIX’s Digital ID suite identifies potentially fraudulent activities
AU10TIX announced the expansion of its Digital ID solution, which enables businesses to securely verify IDs of all types, including physical, digital, eID, verifiable credentials, and more. AU10TIX’s fully automated Digital ID solution serves a.....»»
Hyundai plans $51 billion investment in EVs, software-defined vehicles over 3 years
Hyundai is adding 80,000 new employees, including 44,000 new hires in electrification, SDVs and carbon neutrality......»»
Cybersecurity essentials during M&A surge
The volume of mergers and acquisitions has surged significantly this quarter. Data from Dealogic shows a 130% increase in US M&A activity, totaling $288 billion. Worldwide M&A has also seen a substantial uptick, rising by 56% to $453 billion. Conside.....»»
Cybersecurity jobs available right now: March 27, 2024
Cyber Product Owner UBS | Israel | On-site – View job details Your primary responsibilities will include owning and managing application security testing products, collaborating with the cyber hygiene operational team, and understandi.....»»
How self-driving cars can talk to themselves to navigate the world
Autonomous vehicle companies are employing large language models, a deep learning tool to predict and generate language that can be used to reason through novel situations......»»
Canva acquires Affinity apps in multi-million dollar deal to compete with Adobe
The Affinity suite of apps, which includes Affinity Photo, Designer, and Publisher, has become known as an excellent alternative to the Adobe Creative Cloud suite. But there’s a lot going on behind the scenes, as Serif – the company behind the Af.....»»
Automakers, Tier 1 companies ask suppliers for parts payment delays as investment costs mount
Some automakers and Tier 1 parts companies, on the hook for billions of dollars in EV and software-related investments, are asking their supply chains for longer payment terms or to defer payments entirely......»»
2025 Mini Countryman: More spacious cabin, updated tech
The 2025 update has Level 2 autonomous driving systems that allow drivers to take their hands off the steering wheel on highwaylike routes at speeds of up to nearly 38 mph......»»
How threat intelligence data maximizes business operations
Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives o.....»»
Strengthening critical infrastructure cybersecurity is a balancing act
In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat information sharing, and innovative technologies enhancing resilience agains.....»»
Reinforcement learning is the path forward for AI integration into cybersecurity
AI’s algorithms and machine learning can cull through immense volumes of data efficiently and in a relatively short amount of time. This is instrumental to helping network defenders sift through a never-ending supply of alerts and identify those th.....»»
Tech industry’s focus on innovation leaves security behind
The rapid digital transformation and technological progress within the technology sector have enlarged the attack surface for companies operating in this space, according to Trustwave. As the sector evolves, the proliferation of Software-as-a-Service.....»»