EU adopts Cyber Resilience Act to secure connected products
The EU Council has adopted the Cyber Resilience Act (CRA), a new law that aims to make consumer products with digital components safe(r) to use. CRA requirements The CRA outlines EU-wide cybersecurity standards for digital products, i.e. products tha.....»»
EU adopts Cyber Resilience Act to secure connected products
The EU Council has adopted the Cyber Resilience Act (CRA), a new law that aims to make consumer products with digital components safe(r) to use. CRA requirements The CRA outlines EU-wide cybersecurity standards for digital products, i.e. products tha.....»»
DORA regulation’s nuts and bolts
The frequency, sophistication, and impact of cyber-attacks on financial institutions have been rising. Given the economic system’s interconnected nature, disruptions in one institution can have cascading effects on the broader financial market,.....»»
Data loss incidents impact patient care
92% of healthcare organizations experienced at least one cyber attack in the past 12 months, an increase from 88% in 2023, with 69% reporting disruption to patient care as a result, according to Proofpoint. Healthcare organizations struggle to mitiga.....»»
New infosec products of the week: October 11, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Action1, BreachLock, Commvault, Dashlane, Data Theorem, Edgio, Frontegg, and Qualys. Qualys Enterprise TruRisk Management unifies asset inventory and risk fa.....»»
How personal care products affect indoor air quality
The personal care products we use on a daily basis significantly affect indoor air quality, according to new research by a team at EPFL. When used indoors, these products release a cocktail of more than 200 volatile organic compounds (VOCs) into the.....»»
The 36 best sitcoms on Netflix right now (October 2024)
The best sitcoms on Netflix include Nobody Wants This, Lopez vs. Lopez, The Hughleys, Kevin Can F*** Himself, Unstable, Act Your Age, and more......»»
Apple hosted ‘Global Police Summit’ to help law enforcement use its products better, per report
Typically when Apple and law enforcement are in the news together, it’s because of a standoff over user privacy. But today, a new report outlines the company’s efforts to build bridges with law enforcement—efforts that may be changing. more.....»»
Using ChatGPT to make fake social media posts backfires on bad actors
OpenAI claims cyber threats are easier to detect when attackers use ChatGPT. Using ChatGPT to research cyber threats has backfired on bad actors, OpenAI revealed in a report analy.....»»
Rental crisis in regional cities prompts rethinking of moves
James Cook University researchers say Cairns is a prime example of a regional city where the rental housing crisis is making people who have moved to the city rethink their choice—and they say city planners must act if regional areas want such peop.....»»
Declines in plant resilience threaten carbon storage in the Arctic
Rapid warming has impacted the northern ecosystem so significantly that scientists are concerned the region's vegetation is losing the ability to recover from climate shocks, suggests a new study......»»
Widening talent pool in cyber with on-demand contractors
Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread the workload on, you risk burning out security professionals. Many make.....»»
There’s never been a better time to buy a Dreametech smart cleaning product
Whether you’re a fan of smart assistance with manual cleaning, or delegating the entire cleaning task to a robot, there’s never been a better time than this year’s Amazon Prime Day to grab the latest Dreametech products. Dreame Technology is.....»»
Tidal Cyber empowers organizations to improve their protection efforts
Tidal Cyber announced that it now incorporates test results from Breach and Attack Simulation (BAS) tools and other sources to complement the company’s existing Threat-Informed Defense capabilities. With this new integration, Tidal Cyber Enterprise.....»»
Guide for selecting the right GRC framework, EU edition
Governance, risk, and compliance frameworks are critical. They enable cybersecurity professionals to accurately identify an organization’s risk posture, align business and strategic objectives with technology, and meet compliance responsibilities......»»
Commvault Cloud Rewind helps businesses bounce back from cyber incidents
Commvault launched Cloud Rewind on the Commvault Cloud platform. This offering, which integrates cloud-native distributed application recovery and rebuild capabilities from the Appranix acquisition, gives cloud-first organizations a secret weapon to.....»»
Stellantis poised to secure Italian approval to sell stake in Comau robotics unit, report says
One Equity, which invests in businesses in the industrial, healthcare and technology industries in the U.S. and Europe, is expected to take a 50.1 percent stake in the robotics unit......»»
Prime Big Deal Days smartwatch deals: Apple, Samsung, Fitbit, Garmin
There are discounts from Prime Big Deal Days smartwatch deals for Apple, Google, and Samsung devices, but you should act fast if you don't want to miss out......»»
New insights into bubble interference could enhance electrode design
Industrial electrochemical processes that use electrodes to produce fuels and chemical products are hampered by the formation of bubbles that block parts of the electrode surface, reducing the area available for the active reaction. Such blockage red.....»»
Apple marks MacBook and iPad models ‘vintage,’ adds iPods to ‘obsolete’ list
Today Apple has updated its lists of vintage and obsolete products with new additions. The latest vintage products are select MacBook and iPad models, while key iPods and a beloved iPhone model are now considered ‘obsolete.’ more….....»»
Juniper Secure AI-Native Edge accelerates detection of potential network threats
Juniper Networks announced its new Juniper Secure AI-Native Edge solution, with a new Security Assurance product, combining Juniper Mist’s AI-Native and cloud-native network operations with the efficacy security solution. By integrating network and.....»»