Enterprises persist with outdated authentication strategies
Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface expanding and the increasing sophistication of cyber threats, organizations are st.....»»
Discovery of key protein for biosynthesis of plant defense steroids could enhance pest control strategies
Researchers at the Max Planck Institute for Chemical Ecology have identified GAME15 as a key protein that regulates the biosynthesis of both steroidal glycoalkaloids and steroidal saponins in plants of the genus Solanum......»»
Stem carbohydrate richness in two cycad species
Terrestrial plants have developed strategies to cope with suboptimal conditions. Storage of nonstructural resources is one of those strategies. Nonstructural carbohydrates (NSCs) of plants are primarily sugars and starch, and have been studied extens.....»»
Nationalism forces Chinese multinationals to reclaim home-country identity
Amid a rise in nationalism in China, Chinese multinational enterprises (MNEs) are rethinking their strategies abroad, shifting from adopting local identities to embracing their Chinese roots......»»
Have AI advances led to self-driving breakthroughs or a dead end?
Artificial intelligence advances have unlocked the possibility of using end-to-end models for self-driving purposes. But many experts are concerned companies adopting such strategies are taking shortcuts that will hinder safety......»»
Business expert explores strategies for supporting women in leadership, curbing bias
Women and minority leaders who reach senior executive positions often face more intense scrutiny, and research has recommended organizations provide critical stakeholders with information about a leader to reduce negative biases......»»
Research finds that simplistic and outdated communication tools narrows news focus, restricts user interactivity
Digital media technology has changed journalism considerably, and perhaps most obviously in data journalism. Data journalism uses the power of data analysis and visualization to develop news stories that can be highly engaging and accessible to the p.....»»
Okta helps protect business before, during and after authentication
Okta announced new Workforce Identity Cloud capabilities to address top security challenges such as unmanaged SaaS service accounts, governance risks, and identity verification. As part of a unified approach, these innovations help protect business b.....»»
Strengthening Kubernetes security posture with these essential steps
In this Help Net Security interview, Paolo Mainardi, CTO at SparkFabrik, discusses comprehensive strategies to secure Kubernetes environments from development through deployment. He focuses on best practices, automation, and continuous monitoring. Ma.....»»
New passkey specifications will let users import and export them
Passkeys were introduced two years ago, and they replace traditional passwords with more secure authentication using a security key or biometrics. To make the technology even better, the FIDO Alliance published on Monday new specifications for passke.....»»
Honey bees in demand: New contract strategies to support pollination services
As the world's native bee populations are declining, crop production requiring pollinators increasingly relies on commercial pollination services. In the U.S., the beekeeping industry is in great demand, and truckloads of bee colonies travel the coun.....»»
How to create verification codes in Apple Passwords app
Starting with iOS 18, iPadOS 18, macOS Sequoia, and visionOS 2, the Apple Passwords app enables you to manage your passwords, passkeys, and verification codes. For websites and apps that support two-factor (2FA) or multi-factor authentication (MFA),.....»»
New technologies could help destroy persistent "forever chemicals"
Scientists and engineers are developing new ways to destroy per- and poly-fluoroalkyl substances (PFAS) efficiently and sustainably. This class of chemicals is known as "forever chemicals" because PFAS persist and accumulate in the environment, anima.....»»
OneSpan strenghtens banking security with phishing-resistant authentication
OneSpan announced an innovation in phishing-resistant transaction security, VISION FX. This new solution combines OneSpan’s patented CRONTO transaction signing with FIDO2 protocols that strengthen protection against phishing and account takeover th.....»»
CISOs’ strategies for managing a growing attack surface
In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital transformation. Carlsson highlights the challenges CISOs face today, including mai.....»»
Genetic mechanism unlocks a key secret behind disease infection in crops
Researchers have unraveled a key genetic mechanism behind the way pathogens infect crops, leading to new strategies for breeding resistant crop varieties against other pathogens carrying the same genetic mechanism......»»
Exploit code for critical GitLab auth bypass flaw released (CVE-2024-45409)
If you run a self-managed GitLab installation with configured SAML-based authentication and you haven’t upgraded it since mid-September, do it now, because security researchers have published an analysis of CVE-2024-45409 and an exploit script.....»»
HiddenLayer enhances risk detection for enterprise AI models
HiddenLayer launched several new features to its AISec Platform and Model Scanner, designed to enhance risk detection, scalability, and operational control for enterprises deploying AI at scale. As the pace of AI adoption accelerates, so do the threa.....»»
How Chlamydia pneumoniae bacteria use molecular mimicry to manipulate the host cell
Bacteria that cause diseases, so-called pathogens, develop various strategies to exploit human cells as hosts to their own advantage. A team of biologists from Heinrich Heine University Düsseldorf (HHU), together with medical professionals and exper.....»»
New research reveals what can make a home garden program successful
Increasingly, home gardens—small, cultivated plots in backyards or nearby households—are gaining recognition as one of the most promising strategies to reduce malnutrition. However, not all attempts to establish home gardens are successful or abl.....»»
New seed fossil sheds light on wind dispersal in plants
Scientists have discovered one of the earliest examples of a winged seed, gaining insight into the origin and early evolution of wind dispersal strategies in plants......»»