How effective compensation makes a difference with cyber talent retention
Aligning cybersecurity organization models with business objectives enables talent retention and security program success, according to IANS and Artico Search. CISOs’ role in organizational and staffing decisions Fortune firms with annual reven.....»»
Organizations are changing cybersecurity providers in wake of Crowdstrike outage
More often than not, a cyber attack or a cyber incident that results in business disruption will spur organizations to make changes to improve their cybersecurity and cyber resilience – and sometimes that means changing cybersecurity providers......»»
The surge in cyber insurance and what it means for your business
The cyber insurance market is set for explosive growth as organizations increasingly seek financial protection against rising cyber threats. This surge in demand reflects a broader shift in how businesses approach risk management, viewing cyber insur.....»»
Offensive cyber operations are more than just attacks
In this Help Net Security interview, Christopher Jones, Chief Technology Officer and Chief Data Officer at Nightwing, talks about some key misconceptions and complexities surrounding offensive cyber operations. Many myths stem from a simplistic view.....»»
Saturday Citations: Football metaphors in physics; vets treat adorable baby rhino"s broken leg
This week, researchers reported an effective way to protect working dogs from heat stress: training them to dunk their heads in cool water. A new computational technique provided a breakthrough in understanding the so-called "pseudogap" in quantum ph.....»»
Lucid eyes Detroit engineering talent ahead of EV launches, powertrain supply agreements
Lucid Motors opened a hub near Detroit to attract vehicle engineers. It also wants to provide its powertrain tech to more automakers......»»
Genome sequence analysis identifies new driver of antimicrobial resistance
Antibiotics are a lifesaving tool. Yet, due to their chronic overuse, microbes are evolving and developing immunity against them. As a result, once-effective medications can no longer stave off infections, complicating treatment and increasing mortal.....»»
Independent origins of frog glue and its role in predator evasion
Skin-secreted adhesives, or glues, are highly effective defense adaptations that have evolved recurrently in a small number of amphibians. From an ecological standpoint, this rapidly solidifying material—essentially, a sticky slime—encumbers the.....»»
New infosec products of the week: September 20, 2024
Here’s a look at the most interesting products from the past week, featuring releases from anecdotes, F5 Networks, Gcore, Rapid7, Strivacity, and Veritas Technologies. Veritas unveils AI-driven features to simplify cyber recovery Veritas Technologi.....»»
Global assessment: How to make climate adaptation a success
Climate change is forcing people to adapt to changing environmental conditions. But what really makes the difference is how they do it. The recently published "Hamburg Climate Futures Outlook 2024" by 73 authors shows that, in the long run, only sust.....»»
EU wants to force Apple’s iPhone to work with third-party smartwatches and other accessories
The European Commission wants Apple to continue complying with the Digital Markets Act by requiring the company to offer “free and effective interoperability to third-party … The post EU wants to force Apple’s iPhone to work with third-.....»»
Picus Security raises $45 million to help organizations reduce cyber risk
Picus Security announced it has closed a $45 million growth investment round led by Riverwood Capital with the participation of existing investor Earlybird Digital East Fund, bringing Picus’ total funds raised to $80 million. Picus has over 500 ent.....»»
Data disposal and cyber hygiene: Building a culture of security within your organization
Data breach episodes have been constantly rising with the number of data breach victims crossing 1 billion in the first half of 2024. A recent Data Breach Report 2023 by Verizon confirms that 74% of data breaches are due to human errors. Although cyb.....»»
Essential metrics for effective security program assessment
In this Help Net Security interview, Alex Spivakovsky, VP of Research & Cybersecurity at Pentera, discusses essential metrics for evaluating the success of security programs. Spivakovsky explains how automation and proactive testing can reveal vulner.....»»
Racial and gender bias in US crime victim compensation programs highlighted in report
Significant racial and gender disparities exist in U.S. crime victim compensation programs, revealing Black and Indigenous people as well as survivors of gender-based violence face unique challenges in obtaining financial support, according to a new.....»»
How job-hopping managers undermine corporate culture
As most successful companies will know, building effective corporate culture is very rewarding, but also challenging. It requires senior managers to create shared values and embed those values in their decisions and interactions with staff......»»
Emily Gold, Cheerleader Featured on ‘America’s Got Talent,’ Dies by Suicide at 17
Emily Gold, Cheerleader Featured on ‘America’s Got Talent,’ Dies by Suicide at 17.....»»
Apple Watch Series 10 review roundup: Iterative update, but slim design with big display is like an Ultra Lite
The first Apple Watch Series 10 reviews are out, and those who got early access to the device seem generally impressed, despite seeing it as an iterative update. Highlighted features include the slimmer design making a bigger difference than you m.....»»
Disappearing scientists: Attrition and retention patterns of 2.1 million scientists in 38 OECD countries
Research has been showing that women scientists continue to disappear from science at a significantly higher rate and in higher percentages than men. This is what social scientists have thought for decades—but this is no longer the case today, acco.....»»
Researchers develop new method for delivering RNA and drugs into cells
Researchers at the University of Toronto and its hospital partners have developed a method for co-delivering therapeutic RNA and potent drugs directly into cells, potentially leading to a more effective treatment of diseases......»»
Study finds mine-drainage treatment cost effective, but far more costs lay ahead
New research led by the University of Pittsburgh shows that state and federal appropriations allowing Pennsylvania to treat abandoned mine drainage works to both successfully and cost effectively clean up the acidic water—particularly to the benefi.....»»