IoT cybersecurity is slowly gaining mainstream attention
In this interview for Help Net Security, Jason Oberg, CTO at Cycuity, talks about IoT devices cybersecurity, from production to usage, and how far have we come to securing these devices. IoT has been part of our reality for quite some time, but what.....»»
Week in review: 10 cybersecurity frameworks you need to know, exploited Chrome zero-day fixed
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Key elements for a successful cyber risk management strategy In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses th.....»»
Ivanti EPMM and MobileIron Core vulnerability is actively exploited, CISA confirms (CVE-2023-35082)
A previously patched critical vulnerability (CVE-2023-35082) affecting Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core is being actively exploited, the Cybersecurity and Infrastructure Security Agency (CISA) has confirmed by adding the vuln.....»»
How do human capital and pro-market institutions shape ambitious entrepreneurship in good and crisis times?
Scholars and policymakers have highlighted the positive impact of human capital on entrepreneurial activity. Vast attention has also been directed to the beneficial role of pro-market institutions for entrepreneurship......»»
Researchers find that online reviews are compromised with transparent filter policies
When you try a new restaurant or book a hotel, do you consider the online reviews? Do you submit online reviews yourself? Do you pay attention if they are filtered and moderated? Does that impact your own online review submissions?.....»»
Unlocking the secrets of quasicrystal magnetism: Revealing a novel magnetic phase diagram
Quasicrystals are intermetallic materials that have garnered significant attention from researchers aiming to advance condensed matter physics understanding. Unlike normal crystals, in which atoms are arranged in an ordered repeating pattern, quasicr.....»»
ESET launches MDR service to improve cybersecurity for SMBs
ESET launched ESET MDR, an innovative solution aimed at addressing the evolving cybersecurity challenges faced by SMBs. This launch marks a significant stride in expanding ESET’s security services portfolio with another MDR solution. In a rapidly c.....»»
The power of AI in cybersecurity
The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber threat landscape and cybersecurity. AI as a powerful cybersecurity tool As organi.....»»
Ransomware negotiation: When cybersecurity meets crisis management
In this Help Net Security interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should have a playbook that clearly outlines what to do, when to do it, who is notifi.....»»
Vicarius raises $30 million to accelerate the development of new AI capabilities
Vicarius announced a $30 million Series B led by cybersecurity investment firm Bright Pixel (formerly Sonae IM). AllegisCyber Capital, AlleyCorp, and Strait all participated in the financing. The company’s total funding, including investments from.....»»
Industrial Defender collaborates with Dragos to enhance outcomes for OT operators
Industrial Defender announced a strategic technology partnership with Dragos. The collaboration between these leaders in OT cybersecurity integrates their respective platform capabilities, representing a major move towards combining their leading str.....»»
The right strategy for effective cybersecurity awareness
Employees play a significant role in safeguarding organizational assets. With a constantly evolving threat landscape, cybersecurity awareness training is an essential component in creating a good security culture. Why cybersecurity awareness training.....»»
WhatsApp has been getting more attention in the US – but can it overtake iMessage?
iMessage is certainly one of the most popular messaging platforms in the US, which has resulted in long-standing discussion about its interoperability with non-Apple devices. While some users are waiting for the iPhone to get RCS support later this y.....»»
Accenture and SandboxAQ offer protection against quantum-based decryption attacks
Accenture and SandboxAQ are partnering to deliver AI and quantum computing solutions to help organizations identify and remediate cybersecurity vulnerabilities. According to recent Accenture research, executives’ top concern for 2024 is the ability.....»»
Unraveling the role of supersulfides in regulating mitochondrial function and longevity
Supersulfides are gaining prominence for their occurrence as low-molecular-weight thiols or persulfidated cysteine residues, observed more frequently in both prokaryotic and eukaryotic cells. These compounds, which are characterized by sulfur–sulfu.....»»
10 cybersecurity frameworks you need to know about
As cyber threats grow more sophisticated, understanding and implementing robust cybersecurity frameworks is crucial for organizations of all sizes. This article lists the most essential cybersecurity frameworks developed to guide businesses and gover.....»»
Preventing insider access from leaking to malicious actors
In this Help Net Security video, John Morello, CTO of Gutsy, discusses the often-overlooked aspect of cybersecurity – the offboarding process. He outlines the real-world implications and potential impact on an organization’s security post.....»»
The fate of novel ideas: Scholar investigates factors that thwart potential innovations from gaining acceptance
Innovation may be what drives progress in the arts, business, sciences and technology, but the novel ideas that drive innovation often face headwinds that hinder or even prevent their adoption......»»
Are bugs bugging humans or the other way around? Study reveals a few surprises
Insects and spiders often receive little attention from people, except when we're swatting them away. However, as arthropods—creatures distinguished by a hard exoskeleton and jointed legs— they play an essential role in sustaining the ecosystems.....»»
Akira ransomware attackers are wiping NAS and tape backups
“The Akira ransomware malware, which was first detected in Finland in June 2023, has been particularly active at the end of the year,” the Finnish National Cybersecurity Center (NCSC-FI) has shared on Wednesday. NCSC-FI has received 12 re.....»»
Cyber budgets and the VC landscape in 2024
In this Help Net Security video, Marcus Bartram, General Partner at Telstra Ventures, discusses his 2024 cybersecurity predictions: The U.S. will be in a recession by Q4 2024, and tech companies will continue reducing their workforce. Still, VCs will.....»»