IoT cybersecurity is slowly gaining mainstream attention
In this interview for Help Net Security, Jason Oberg, CTO at Cycuity, talks about IoT devices cybersecurity, from production to usage, and how far have we come to securing these devices. IoT has been part of our reality for quite some time, but what.....»»
Weak passwords for smart home devices to be illegal in Europe
Default passwords for smart home devices and wireless routers will have to be made stronger in order to comply with new cybersecurity laws in both the UK and EU … more….....»»
Silobreaker empowers users with timely insight into key cybersecurity incident filings
Silobreaker announced the addition of automatic collection, AI-enhanced analysis, and alerting on 8-K cybersecurity incident filings made to the US Securities and Exchange Commission (SEC). This enhancement to the Silobreaker platform empowers organi.....»»
UK enacts IoT cybersecurity law
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop using guessable default passwords and have a vulnerability disclosure poli.....»»
Orion"s erupting star system reveals its secrets
An unusual group of stars in the Orion constellation have revealed their secrets. FU Orionis, a double star system, first caught astronomers' attention in 1936 when the central star suddenly became 1,000 times brighter than usual. This behavior, expe.....»»
Anticipating and addressing cybersecurity challenges
In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about how increased adoption of cloud technology, remote work, and the proliferation of IoT devices present significant challenges.....»»
Closing the cybersecurity skills gap with upskilling programs
The list of skills technologists and organizations need to succeed grows with each new tech advancement, according to Pluralsight. But for many organizations, budgets and staff continue to shrink. This survey asked 1,400 executives and IT professiona.....»»
The Mysterious ‘Dark’ Energy That Permeates the Universe Is Slowly Eroding
Physicists call the dark energy that drives the universe “the cosmological constant.” Now the largest map of the cosmos to date hints that this mysterious energy has been changing over billions of years......»»
Genesis" Claudia Marquez: We"re "becoming completely independent" from Hyundai in U.S.
The premium spinoff is becoming more independent from its mainstream counterpart with stronger brand awareness, new products and strong sales......»»
One-pot strategy to simultaneously achieve heterodehydrocoupling of hydrostannane and reduction of quinoline
Heteroatom tin compounds (SSn, OSn, NSn, PSn) composed of heteroatoms S, O, N, P and tin atoms have attracted intense attention due to their wide applications in organic synthesis and pharmaceutical fields. The current methods for synthesis of such c.....»»
Breaking down the numbers: Cybersecurity funding activity recap
Here’s a list of interesting cybersecurity companies that received funding so far in 2024. Aim Security January | $10 million Aim Security raised $10 million in seed funding, led by YL Ventures, with participation from CCL (Cyber Club Lond.....»»
Former Apple researchers launch startup focused on protecting iOS devices
Two former Apple employees who worked for the company as cybersecurity researchers are now launching their own startup. Called DoubleYou, the startup is focused on helping creators of cybersecurity products protect iOS devices and Macs. more….....»»
New dataset sheds light on relationship of far-red sun-induced chlorophyll fluorescence to canopy-level photosynthesis
In recent years, the scientific community has increasingly turned its attention to sustainable agriculture, aiming to maximize crop yield while minimizing environmental impact. A crucial aspect of this research involves understanding the fundamental.....»»
Philippines" counter-terrorism strategy still stalled after 7 years since the "ISIS siege" on Marawi
Following the 2017 siege of Marawi, the Philippines' counter-terrorism efforts have faced an increasingly complex and unpredictable landscape. While authorities have claimed victory, one which garnered global media attention during the peak of ISIS r.....»»
Gender-nonconforming ancient Romans found refuge in community dedicated to goddess Cybele
A Vatican declaration, the "Infinite Dignity," has brought renewed attention to how religions define and interpret gender and gender roles......»»
Sublime Security secures $20 million to strengthen cloud email security and visibility
Sublime Security has raised $20 million in Series A funding, led by Index Ventures with participation from previous investors Decibel Partners and Slow Ventures. Cybersecurity visionary and Crowdstrike Co-founder & former CTO Dmitri Alperovitch is al.....»»
Anatomy IT’s new Security Suite targets healthcare cybersecurity threats, improves incident response
Anatomy IT has announced the launch of an expanded end-to-end cybersecurity product suite designed to safeguard healthcare delivery organizations from evolving and growing IT system threats. A record 133 million individuals were affected by healthcar.....»»
25 cybersecurity AI stats you should know
In this article, you will find excerpts from reports we recently covered, which offer stats and insights into the challenges and cybersecurity issues arising from the expansion of AI. Security pros are cautiously optimistic about AI Cloud Security Al.....»»
Overcoming GenAI challenges in healthcare cybersecurity
In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on patient privacy. What are the key cybersecurity challenges in healthcare in the.....»»
WhatsApp now rolling out passkey support for iPhone users
WhatsApp has been internally testing passkey support in its iPhone app for some time. However, the option was still unavailable to most users. But that seems to be changing now, as Meta is slowly rolling out the passkey option to WhatsApp users on th.....»»
Comcast Business MDR limits the impact of cyber threats
Comcast Business has expanded its cybersecurity portfolio with the launch of its Comcast Business Managed Detection and Response (MDR) solution. The solution combines an advanced security analytics platform and Security Operations Center (SOC) to hel.....»»