Edgio ASM reduces risk from web application vulnerabilities
Edgio launched its Attack Surface Management (ASM) solution. ASM is designed to discover all web assets, provide full inventory of technologies, detect security exposures and manage exposure response across an organization from a centralized manageme.....»»
Diverse crop rotations reduce risk of crop loss under poor growing conditions
Researchers at the U.S. Department of Agriculture's Agricultural Research Service (ARS) are responding to the increasingly uncertain climate. The warmer and more unpredictable weather has been a source of instability on U.S. farms. ARS agroecologists.....»»
Teens recognize risk behavior in movies and series, but are not always critical
When teens see risk behavior such as drinking, smoking or drug use in movies or series, they sometimes find it difficult to define whether it's realistic or not. They recognize stereotypes but cannot always interpret it critically. This is according.....»»
Bacterial defense strategy has potential application in genome editing
Scientists who have described in a new study the step-by-step details of a bacterial defense strategy see the mechanism as a promising platform for development of a new genome-editing method......»»
Study shows an electrically-activated protein regulates spermatogenesis
Frankenstein's monster was brought to life by the judicious application of a little electricity; and a surprising number of processes in our bodies are regulated by electrical currents too. Now, researchers from Japan reveal that electricity may play.....»»
Climate change will increase foodborne illness risk from raw produce, research suggests
Climate change will increase the risk of foodborne illness from Salmonella enterica, according to a new study. The research appears in Applied and Environmental Microbiology......»»
Colorado"s wildfire risk is so high a fire department struggled to find insurance to build a new firehouse
The Durango Fire Protection District was repeatedly denied insurance coverage for the construction of its new downtown firehouse earlier this year because of the wildfire risk......»»
Concentric AI unveils AI-based DSPM functionality that monitors user activity risk
Concentric AI announced an AI-based DSPM functionality that monitors user activity risk and remediates user-centric data security issues in on-premises data repositories such as Windows file shares and DELL Isilon environments. With this launch, ente.....»»
RISCPoint RADAR provides real-time vulnerability detection across multiple attack surfaces
RISCPoint Advisory Group launched RADAR, an all-in-one cybersecurity platform. Combining continuous threat discovery with expert-led Penetration Testing as a Service (PTaaS), RADAR represents a significant leap forward in proactive security and risk.....»»
Third-party risk management is under the spotlight
In the aftermath of the CrowdStrike IT outage, new research has uncovered a critical vulnerability within financial institutions regarding supply chain resilience. The outage has demonstrated the need for greater digital supply chain resilience, part.....»»
Canadian insurers and municipalities sharing data could improve availability, affordability of flood insurance
The increasing cost of flood damage has seen property insurance become less affordable for many Canadians. New research from the University of Waterloo shows that if insurers and local governments pooled information on investment in flood-risk manage.....»»
Rezonate’s mid-market solution reduces the cloud identity attack surface
Rezonate announced a new identity security solution for mid-market companies. The offering proactively reduces the identity attack surface and improves compliance efforts in a fraction of the time of legacy IAM tools or manual methods. This approach.....»»
F5 and Intel join forces to push the boundaries of AI deployment
F5 announced it is bringing application security and delivery capabilities to AI deployments powered by Intel. This new joint solution combines security and traffic management from F5’s NGINX Plus offering with the optimization and performance of t.....»»
Expel partners with Wiz to enhance security for cloud environments
Expel announced a new strategic partnership with Wiz, a cloud-native application protection platform (CNAPP). The partnership provides an integration offering MDR for Wiz toxic risk combinations (including vulnerabilities, secrets, malware, and threa.....»»
Cybersecurity jobs available right now: August 28, 2024
Business Information Security Officer Toyota North America | USA | On-site – View job details Acting as an Information Security ambassador to the business, this role works with technology, data, risk, business, and the larger TFS Info.....»»
There’s a scary new way to undo Windows security patches
A security researcher has released a new tool that can unpatch your Windows computer and expose it to old vulnerabilities......»»
Researchers develop near-infrared spectroscopy models to analyze corn kernels and biomass
In the agricultural and food industry, determining the chemical composition of raw materials is important for production efficiency, application, and price. Traditional laboratory testing is time-consuming, complicated, and expensive. New research fr.....»»
AI modeling can deliver more benefits, less risk for water partnerships
A Cornell-led research collaboration found that cooperative partnerships seeking to spread the cost burden of water infrastructure projects among regional stakeholders often end up forcing local partners to bear the brunt of underlying supply and fin.....»»
GM captive finance company withdraws application to create a bank
The captive finance arm of General Motors applied to charter a type of bank called an Industrial Loan Company in late 2020......»»
Study IDs best "red flags" auditors can use to spot financial fraud
A new analysis of the benchmarks that auditors use to identify financial statement fraud risk finds that the most commonly used benchmarks are less effective at identifying fraud than benchmarks that are less commonly used......»»
Adversaries love bots, short-lived IP addresses, out-of-band domains
Fastly found 91% of cyberattacks – up from 69% in 2023 – targeted multiple customers using mass scanning techniques to uncover and exploit software vulnerabilities, revealing an alarming trend in attacks spreading across a broader target base. In.....»»