Edgescan EASM allows organizations to secure their critical assets and applications
Edgescan released its new External Attack Surface Management solution, offering visibility and continuous monitoring to help secure organizations of all sizes. Today’s enterprises require a cloud-savvy security solution that effectively invento.....»»
Novel magnetic field integration enhances green hydrogen peroxide production
Researchers have achieved a breakthrough in improving the efficiency of an electrochemical reaction that produces hydrogen peroxide—a vital chemical for industrial applications including disinfection, bleaching, and treating sewage. This reaction,.....»»
IBM announces Autonomous Security for Cloud
IBM announced Autonomous Security for Cloud (ASC), an AI-powered solution from IBM Consulting designed to automate cloud security management and decision-making to help mitigate risk for organizations accelerating their cloud journey on Amazon Web Se.....»»
USX Cyber strengthens phishing defense in GUARDIENT XDR
USX Cyber released advanced phishing protection tools within its GUARDIENT XDR platform. This latest enhancement enables organizations to strengthen defenses against sophisticated phishing attacks by providing employees with realistic training and h.....»»
Bitsight acquires Cybersixgill to help organizations manage cyber exposure
Bitsight announced it has signed a definitive agreement to acquire Cybersixgill, a global cyber threat intelligence (CTI) data provider. Together, Bitsight and Cybersixgill will provide visibility into an organization’s external attack surface,.....»»
NIST report on hardware security risks reveals 98 failure scenarios
NIST’s latest report, “Hardware Security Failure Scenarios: Potential Hardware Weaknesses” (NIST IR 8517), explores the hidden vulnerabilities in computer hardware, a domain often considered more secure than software. The report hig.....»»
New infosec products of the week: November 15, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Absolute Security, BlackFog, Eurotech, Nirmata, Rakuten Viber, Syteca, and Vectra. Eurotech ReliaGATE 15A-14 enables organizations to meet regulatory standar.....»»
Critical vulnerabilities persist in high-risk sectors
Finance and insurance sectors found to have the highest number of critical vulnerabilities, according to Black Duck. Finance and insurance industry faces highest vulnerabilities The report, which analyzes data from over 200,000 dynamic application se.....»»
AI’s impact on the future of web application security
In this Help Net Security interview, Tony Perez, CEO at NOC.org, discusses the role of continuous monitoring for real-time threat detection, the unique risks posed by APIs, and strategies for securing web applications. Perez also addresses how AI-dri.....»»
Mathematical approach can predict crystal structure in hours instead of months
Researchers at New York University have devised a mathematical approach to predict the structures of crystals—a critical step in developing many medicines and electronic devices—in a matter of hours using only a laptop, a process that previously.....»»
How much lighter is the titanium iPhone 16 Pro vs steel iPhones?
Brought to you by Uniq: Uniq’s new FlexGrip™ band for iPhone offers a secure, one-handed hold for ultimate convenience while freeing up your other hand for multitasking with ease. Learn more. The iPhone 16 Pro devices offer Apple’s largest.....»»
Red Hat Enterprise Linux 9.5 helps organizations simplify operations
Red Hat announced Red Hat Enterprise Linux 9.5. Red Hat Enterprise Linux helps organizations deploy applications and workloads more quickly and with greater reliability, enabling them to lower costs and more effectively manage workloads across hybrid.....»»
Google Cloud Cybersecurity Forecast 2025: AI, geopolitics, and cybercrime take centre stage
Google Cloud unveiled its Cybersecurity Forecast for 2025, offering a detailed analysis of the emerging threat landscape and key security trends that organizations worldwide should prepare for. The report delivers insights into the tactics of cyber a.....»»
CMS develops new AI algorithm to detect anomalies at the Large Hadron Collider
In the quest to uncover the fundamental particles and forces of nature, one of the critical challenges facing high-energy experiments at the Large Hadron Collider (LHC) is ensuring the quality of the vast amounts of data collected. To do this, data q.....»»
Unique magnetic properties of 2D triangular lattice materials have potential applications for quantum computing
Researchers from a large international team, including ANSTO, have investigated the magnetic properties of two unique 2D triangular lattice antiferromagnetic materials (2D-TLHAF) using various neutron scattering techniques......»»
Absolute Security releases Enterprise Edition
Absolute Security launched Enterprise Edition, combining the new Safe Connect for Secure Access and Comply Module for Secure Endpoint. With these innovations, Enterprise Edition is the comprehensive Security Service Edge (SSE) that can ensure only se.....»»
Cequence Security enables organizations to elevate their API defenses
Cequence Security announced its new API Security Assessment Services. Designed to provide immediate, actionable insights into API security risks, these time-bound and fixed services leverage Cequence’s advanced Unified API Protection platform, enab.....»»
Vectra AI adds AI-powered detections to help secure Microsoft customers
Vectra AI announced the extension of the Vectra AI Platform to include comprehensive coverage for customers’ Microsoft Azure environments. With the addition of over 40 unique attacker behavior detections for Microsoft Azure, Vectra AI now deliv.....»»
Teen in critical condition with Canada’s first human case of H5 bird flu
The teen had no clear exposures to animals. No contacts have tested positive. A British Columbia teen who contracted Canada's first known human case of H5 bird flu has deteriorate.....»»
Splunk expands observability portfolio to provide organizations with deeper business context
Splunk announced innovations across its expanded observability portfolio to empower organizations to build a leading observability practice. These product advancements provide ITOps and engineering teams with more options to unify visibility across t.....»»
Bectran adds RSA encryption to protect the transmission of sensitive data
Keeping information secure is both a leading challenge and priority among B2B credit, collections and accounts receivables departments. It requires vigilance against scams like identity theft and hacks that intercept vital business and customer infor.....»»