Graphene for the protection of paintings: paving the way for novel methods in art preservation and restoration
The exposure of colors used in artworks to ultraviolet (UV) and visible light in the presence of oxidizing agents triggers color degradation, fading and yellowing. These degradation mechanisms can lead to irreversible alteration of artworks. Protect.....»»
HYCU for Microsoft Entra ID provides organizations with automated, policy-driven backups
HYCU announced significant updates to its HYCU R-Cloud data protection platform that offers customers additional protection for their Identity and Access Management (IAM) solutions with support for Microsoft Entra ID. With this announcement, customer.....»»
Old methods, new technologies drive fraud losses
GenAI, deepfakes and cybercrime are critical threats putting intensifying pressures on businesses, according to Experian. Top online security concerns for consumers According to the FTC, consumers reported losing more than $10 billion to fraud in 202.....»»
Hillstone Networks unveils StoneOS 5.5R11 to enhance threat protection
Hillstone Networks has launched the latest version of its operating system, StoneOS 5.5R11. This update includes over 200 new functionalities and improvements designed to enhance threat protection and facilitate enterprise network operations in an in.....»»
Closing the RNA loop holds promise for more stable, effective RNA therapies
New methods to shape RNA molecules into circles could lead to more effective and long-lasting therapies, shows a study by researchers at the University of California San Diego. The advance holds promise for a range of diseases, offering a more enduri.....»»
Uber was just hit with a massive $320 million fine. Here’s why
Uber allegedly violated GDPR guidelines and now faces a stiff fine from the Dutch Data Protection Agency......»»
Hybrid imaging approach reveals microbes in 3D
Caltech researchers have developed a new method to create three-dimensional images of complex communities of bacteria and plant roots. The technology synthesizes two traditional methods of imaging: visualizing microbes with fluorescence and a noninva.....»»
Rebrand, regroup, ransomware, repeat
Changes witnessed over the last few years have led to larger ransomware groups breaking into smaller units, posing more considerable challenges for law enforcement. Ransomware actors are evading arrest more easily and adapting methods with innovative.....»»
Ultra-sensitive photothermal microscopy technique detects single nanoparticles as small as 5 nm
The detection of individual particles and molecules has opened new horizons in analytical chemistry, cellular imaging, nanomaterials, and biomedical diagnostics. Traditional single-molecule detection methods rely heavily on fluorescence techniques, w.....»»
Indigenous fire management "locks up" carbon
Scientists have revealed Indigenous fire management can "lock up" more carbon than other methods of native bushland management and the practice could prove very lucrative for landholders......»»
Researchers achieve first CRISPR-based genome editing in Nile grass rats
A team of researchers at Michigan State University has discovered a set of methods that enabled the first successful CRISPR-based genome editing in Nile grass rats......»»
Scientists call for an update in environmental decision making that takes human rights into account
Human well-being is connected to nature for food, climate regulation and culture, making the protection of nature a human rights matter......»»
New infosec products of the week: August 23, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Entrust, Fortanix, McAfee, Own, RightCrowd, and Wallarm. Own proactively detects and stores data changes in Salesforce Continuous Data Protection from Own pu.....»»
World"s first micromachine twists 2D materials at will
Just a few years ago, researchers discovered that changing the angle between two layers of graphene, an atom-thick sheet of carbon, also changed the material's electronic and optical properties. They then learned that a "twist" of 1.1 degrees—dubbe.....»»
GenAI models are easily compromised
95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manip.....»»
Bulwark of blooms: The lily"s secret armor against plant pathogens
Fusarium wilt is a severe threat to the global cut-flower industry, particularly impacting lilies. Caused by Fusarium oxysporum, this disease results in significant economic losses due to plant decay and death. Traditional breeding methods have strug.....»»
RightCrowd introduces Mobile Credential Management feature
RightCrowd introduced Mobile Credential Management feature for RightCrowd SmartAccess. This solution transforms how organizations manage and control access, replacing traditional methods with a more secure, efficient, and cost-effective approach. As.....»»
Comparing methods for extracting edible protein from mealworms
Edible insects are emerging as an alternative protein source that has various benefits compared with conventional animal sources. New research published in the Journal of Food Science compared four different methods for extracting protein from mealwo.....»»
Multidirectional negative-stiffness isolation system offers improved seismic protection
Seismic isolation is crucial for safeguarding buildings from earthquake damage. While traditional systems are effective, they struggle with multidirectional forces and adequate damping. These challenges highlight the need for innovative solutions tha.....»»
Sea anemone study identifies potentially regenerative stem cells linked to conserved genes
The sea anemone Nematostella vectensis is potentially immortal. Using molecular genetic methods, developmental biologists led by Ulrich Technau from the University of Vienna have now identified possible candidates for multipotent stem cells in the se.....»»
Own proactively detects and stores data changes in Salesforce
Own released Continuous Data Protection for Salesforce customers, further strengthening its product offering to include recovery and analysis capabilities. Own Continuous Data Protection provides a turn-key solution that delivers significant value to.....»»