IoT cybersecurity is slowly gaining mainstream attention
In this interview for Help Net Security, Jason Oberg, CTO at Cycuity, talks about IoT devices cybersecurity, from production to usage, and how far have we come to securing these devices. IoT has been part of our reality for quite some time, but what.....»»
Women rising in cybersecurity roles, but roadblocks remain
The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several significant findings. These include promising trends in women’s entry into the profession, their roles wit.....»»
Study shows a tale of two social media platforms for Donald Trump
Truth Social was more effective at driving news attention toward Donald Trump during the 2022 midterm election cycle than Twitter (now known as X) was during the 2016 primary election season, a pattern driven mostly by partisan media on the left and.....»»
Tire toxicity faces fresh scrutiny after salmon die-offs
For decades, concerns about automobile pollution have focused on what comes out of the tailpipe. Now, researchers and regulators say, we need to pay more attention to toxic emissions from tires as vehicles roll down the road......»»
Essential steps for zero-trust strategy implementation
63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing a zero-trust strategy, this investment represents less than 25% of the overall cybersecurity budget......»»
Cybersecurity jobs available right now: May 1, 2024
Adversary Simulation Specialist LyondellBasell | Poland | On-site – View job details The Adversary Simulation Specialist will be responsible for testing and evaluating the security of a LyondellBasell’s networks, systems, and applic.....»»
Making cybersecurity more appealing to women, closing the skills gap
In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women face in the cybersecurity industry. Davis emphasizes the need for proactive strategies to attract diverse talent, imp.....»»
Cybersixgill Third-Party Intelligence module identifies potential supply chain risks
Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security team.....»»
eBook: Do you have what it takes to lead in cybersecurity?
Organizations worldwide need talented, experienced, and knowledgeable cybersecurity teams who understand the advantages and risks of emerging technologies. Aspiring leaders in the cybersecurity field need more than just job experience. They need a di.....»»
Say goodbye to garlic breath with odor-free black garlic
Garlic breath could be a thing of the past, thanks to a University of Queensland collaboration helping promote odorless black garlic in mainstream Australia......»»
Here’s even more proof that AMD’s GPUs are in trouble
Reports indicate that MSI is slowly pulling away from making graphics cards for AMD......»»
Weak passwords for smart home devices to be illegal in Europe
Default passwords for smart home devices and wireless routers will have to be made stronger in order to comply with new cybersecurity laws in both the UK and EU … more….....»»
Silobreaker empowers users with timely insight into key cybersecurity incident filings
Silobreaker announced the addition of automatic collection, AI-enhanced analysis, and alerting on 8-K cybersecurity incident filings made to the US Securities and Exchange Commission (SEC). This enhancement to the Silobreaker platform empowers organi.....»»
UK enacts IoT cybersecurity law
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop using guessable default passwords and have a vulnerability disclosure poli.....»»
Orion"s erupting star system reveals its secrets
An unusual group of stars in the Orion constellation have revealed their secrets. FU Orionis, a double star system, first caught astronomers' attention in 1936 when the central star suddenly became 1,000 times brighter than usual. This behavior, expe.....»»
Anticipating and addressing cybersecurity challenges
In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about how increased adoption of cloud technology, remote work, and the proliferation of IoT devices present significant challenges.....»»
Closing the cybersecurity skills gap with upskilling programs
The list of skills technologists and organizations need to succeed grows with each new tech advancement, according to Pluralsight. But for many organizations, budgets and staff continue to shrink. This survey asked 1,400 executives and IT professiona.....»»
The Mysterious ‘Dark’ Energy That Permeates the Universe Is Slowly Eroding
Physicists call the dark energy that drives the universe “the cosmological constant.” Now the largest map of the cosmos to date hints that this mysterious energy has been changing over billions of years......»»
Genesis" Claudia Marquez: We"re "becoming completely independent" from Hyundai in U.S.
The premium spinoff is becoming more independent from its mainstream counterpart with stronger brand awareness, new products and strong sales......»»
One-pot strategy to simultaneously achieve heterodehydrocoupling of hydrostannane and reduction of quinoline
Heteroatom tin compounds (SSn, OSn, NSn, PSn) composed of heteroatoms S, O, N, P and tin atoms have attracted intense attention due to their wide applications in organic synthesis and pharmaceutical fields. The current methods for synthesis of such c.....»»
Breaking down the numbers: Cybersecurity funding activity recap
Here’s a list of interesting cybersecurity companies that received funding so far in 2024. Aim Security January | $10 million Aim Security raised $10 million in seed funding, led by YL Ventures, with participation from CCL (Cyber Club Lond.....»»