Exploring NIST Cybersecurity Framework 2.0
In this Help Net Security video, Dan Erel, VP of Security at SeeMetrics, discusses NIST Cybersecurity Framework (CSF) 2.0. NIST CSF is based on existing standards, guidelines, and practices for organizations to manage and reduce cybersecurity risk be.....»»
USX Cyber GUARDIENT helps MSPs protect their clients
USX Cyber unveiled GUARDIENT, an eXtended Detection and Response (XDR) cybersecurity platform designed specifically for Managed Service Providers (MSPs) serving small to medium-sized businesses. This solution addresses the urgent need for comprehensi.....»»
Uranium science researchers investigate feasibility of intentional nuclear forensics
Despite strong regulations and robust international safeguards, authorities routinely interdict nuclear materials outside of regulatory control. Researchers at the Department of Energy's Oak Ridge National Laboratory are exploring a new method that w.....»»
New evaluation framework helps quantify supply and demand of carbon sequestration services
The Lancang Mekong River Basin (LMRB) connects six countries in Southeast Asia. To support the ecological, economic and social sustainable development of the LMRB, low carbon management services need to be implemented in each country within the basin.....»»
Enterprises increasingly turn to cloud and AI for database management
Across various tasks, from predictive analytics to code generation, organizations in all sectors are exploring how AI can add value and increase efficiency. In this Help Net Security video, Ryan Booz, PostgreSQL Advocate at Redgate, discusses the key.....»»
Next-gen CarPlay could look like this in some of the most iconic cars
At WWDC 2024, Apple provided new details on its plans for next-generation CarPlay, focusing on how the design can be adapted by individual automakers. Now, the folks at design firm BlackBox Infinite have put Apple’s CarPlay framework to the test by.....»»
Cybersecurity jobs available right now: June 26, 2024
CISO Influx | Indonesia | Remote – View job details As a CISO, you will be responsible for protecting Influx from information security risks through the development, implementation, and maintenance of our security program (policies, p.....»»
The space bricks have landed
ESA scientists have been exploring how a future moon base might be built from materials on the lunar surface. Inspired by LEGO building, they have used dust from a meteorite to 3D-print "space bricks" to test the idea. ESA's space bricks are on displ.....»»
Guide to mitigating credential stuffing attacks
We have a collective unaddressed weakness when it comes to basic cybersecurity. Out of the many reports circulating in the news today, many statistics revolve around the number of detected breaches. Why are credentials so sought after? How can we com.....»»
Breaking down the numbers: Q2 2024 cybersecurity funding activity recap
We present a list of selected cybersecurity companies that received funding during the second quarter of 2024 (Q2 2024). Alethea April | $20 million Alethea closed a $20 million Series B funding round led by GV, with participation from Ballistic.....»»
CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0
In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features, significant advantages, and innovative technologies behind Qualys CyberSecurity Asset Management 3.0. Can you explain the k.....»»
Zeek: Open-source network traffic analysis, security monitoring
Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a hardware, software, virtual, or cloud platform. This flexibility allows Zeek to qu.....»»
Mindfulness, monasticism, and women in Thai Buddhism
Katherine Scahill, a Ph.D. candidate in the Department of Music, has always been interested in the overlap of music and mindfulness. She grew up playing the violin, and, as an undergraduate at Wesleyan University, first began exploring that intersect.....»»
CDK cyberattacks could trigger litigation from consumers and dealers alike
It was a rough week as CDK Global dealt with two cybersecurity attacks, its customers rushed to adapt and experts predicted more breaches to come......»»
Supporting the right small changes can have big impacts on climate action, say researchers
Small changes in our everyday actions can trigger significant, rapid societal shifts especially when it comes to climate action. A new IIASA-led study highlights the importance of analyzing these dynamics with a comprehensive framework to harness the.....»»
Focusing micromechanical polaritons in topologically nontrivial hyperbolic metasurfaces
Dr. Johan Christensen, leader of IMDEA Materials Institute's Mechanical and Acoustic Metamaterials research group, is among the researchers behind a pioneering study exploring the topological properties of metamaterials......»»
Exploring the roots of the Anthropocene
Understanding how tropical land use and deforestation affects the dynamics of the global Earth system and identifying potential tipping points are key to the future of our species on this planet. By exploring the long history of human societies in tr.....»»
U.S. to ban Kaspersky antivirus software over alleged Russian links
The Biden administration is banning the use of Kaspersky Lab cybersecurity software throughout the U.S. over concerns about Russian interference......»»
US bans Kaspersky antivirus software due to national security risks
The US Department of Commerce has announced an upcoming US-wide ban of cybersecurity and antivirus software by Kaspersky, as its “ability to gather valuable US business information, including intellectual property, and to gather US persons’ s.....»»
Pressure mounts on CISOs as SEC bares teeth with legal action
A Panaseer investigation into organizations’ annual 10-K filings reported to the SEC shows that from January-May 2024, at least 1,327 filings mentioned NIST – a key indicator that cybersecurity posture is present in a filing. This compares to jus.....»»
Dealers can take steps to reduce cybersecurity risks
With CDK's DMS platform shut down for days, here's a reminder of risk reduction methods recommended by experts......»»