How Russian threats turned this country into the go-to expert on cyber defense
When people like the German Chancellor Angela Merkel or the King of Belgium want to learn more about cybersecurity, they go to Estonia......»»
HITRUST updates Cyber Threat Adaptive engine to address emerging cyber threats
HITRUST announced a comprehensive update to its Cyber Threat Adaptive engine to enable increased accuracy and timeliness of HITRUST CSF updates to address emerging cyber threats. This update introduces advanced AI capabilities through a collaboration.....»»
Nepal battles raging wildfires across the country
Firefighters and local residents battled a massive wildfire on the outskirts of Nepal's capital Thursday as the Himalayan republic endures a severe fire season authorities have blamed on a heat wave......»»
Illumio and Wiz’s integration enhances cyber resilience in the cloud
Illumio has partnered with Wiz and joins Wiz Integrations (WIN) Platform. Illumio enhances WIN by bringing the power of Illumio’s Zero Trust Segmentation platform to the partner ecosystem, so that customers can seamlessly integrate Wiz into their e.....»»
Nord Security unveils NordStellar, a platform for advanced cyber threat detection and response
Nord Security introduces NordStellar, a next-generation threat exposure management platform. Created by developers of VPN solution NordVPN, the enterprise cyber threat exposure management platform helps businesses detect and respond to cyber threats,.....»»
Deep Instinct DIANNA provides malware analysis for unknown threats
Deep Instinct announced the launch of Deep Instinct’s Artificial Neural Network Assistant (DIANNA), an AI-based cybersecurity companion that provides explainability into unknown threats. DIANNA enhances Deep Instinct’s prevention-first approa.....»»
Why Lincoln turned its 30-second ad background track into a streamable song
After watching its social media audience beg for access to the brief, atmospheric song included in its latest video spot, Lincoln put an extended two-and-a-half-minute version on streaming platforms......»»
Lithia trims U.K. car dealership network after Pendragon deal
Lithia Motors is paring its U.K. auto retail footprint with cuts to the Pendragon network after entering and expanding throughout the country in the past 13 months. It's dropping 16 used-car CarStore locations and rebranding 11 others......»»
Deadly Massachusetts Apple Store crash caused by faulty AI, says defense
The trial over the Massachusetts Apple Store crash is well underway, and the defense is claiming that bad AI was the culprit, not the driver.Source: AP Photo/Steven SenneDriver Bradley Rein drove the car into the Apple Derby Street store in November.....»»
US Republicans vote to remove wolf protections
The Republican-majority US House of Representatives on Tuesday passed a bill that would remove endangered species protections for the gray wolf across much of the country, sparking outrage among conservationists......»»
Infosec products of the month: April 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint, IDnow, Immuta, Index Engines, Invicti Security, LogRhythm, Netwrix, Owl Cyber Defense Solutions, Privace.....»»
Big data reveals true climate impact of worldwide air travel
For the first time ever, researchers have harnessed the power of big data to calculate the per-country greenhouse gas emissions from aviation for 197 countries covered by an international treaty on climate change......»»
The academic sleuth facing death threats and ingratitude
Lonni Besançon devotes evenings and weekends to rarely appreciated sanitation work. By examining scientific articles after they are published and exposing shortcomings, he has made himself an enemy of both researchers and publishers. It has gone so.....»»
Cybersixgill Third-Party Intelligence module identifies potential supply chain risks
Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security team.....»»
Onyxia launches AI-powered predictive insights to optimize security management
Onyxia Cyber unveiled OnyxAI to deliver insights that enable security leaders to proactively optimize security performance, resource allocation, and risk management. “We are seeing a real need in the market for security solutions that can simplify.....»»
The Uncomfortable Truth About the UK’s Climate Policies
Britain’s former climate adviser says the country’s future plans are weak, climate protests are no longer helpful, and working closely with Big Oil is a jarring necessity......»»
Why the automotive sector is a target for email-based cyber attacks
While every organization across every vertical is at risk of advanced email attacks, certain industries periodically become the go-to target for threat actors. In this Help Net Security video, Mick Leach, Field CISO at Abnormal Security, discusses wh.....»»
Meta to face EU probe for not doing enough to stop Russian disinformation
Insufficient moderation of political ads risk undermining electoral process. Enlarge (credit: FT) Brussels is set to open a probe into Meta’s Facebook and Instagram as soon as Monday over concerns the social media gian.....»»
Elon Musk loses appeal bid for "funding secured" case at U.S. Supeme Court
The justices turned away Musk's appeal of a lower court's decision upholding the 2018 settlement reached after he said on social media that he had "funding secured" to take Tesla private......»»
I was wrong about cloud gaming. One small setup change showed me the light
I wasn't a believer in cloud gaming when I tried it before, but a tweak to my router has turned me into a convert......»»
AI is creating a new generation of cyberattacks
Most businesses see offensive AI fast becoming a standard tool for cybercriminals, with 93% of security leaders expecting to face daily AI-driven attacks, according to Netacea. Offensive AI in cyberattacks The research, “Cyber security in the age o.....»»