JCDC’s strategic shift: Prioritizing cyber hardening
In this Help Net Security interview, Geoffrey Mattson, CEO of Xage Security, discusses the evolution of the Joint Cyber Defense Collaborative (JCDC) since its 2021 inception and tackles its 2024 strategic priorities in response to escalating cyber th.....»»
Businesses expect cyber threats to rise, but aren’t ready for them
Businesses expect cyber threats to rise, but aren’t ready for them.....»»
Top 10 strategic technology trends shaping the future of business
The ethical and responsible use of technology is fast becoming part of the mandate for CIOs, as organizations balance the need for progress with the protection of stakeholders’ trust and well-being, according to Gartner. “This year’s top strate.....»»
A cooling shift: Slowing ocean circulation may temper Arctic temperature rise
The Arctic is warming at three to four times the global average. However, new research suggests the slowing of a key ocean current could reduce projected Arctic warming by up to 2 degrees Celsius by the end of the century......»»
UK courts are getting it wrong on eyewitness evidence, argues study
A pivotal shift in how UK courts view eyewitness evidence is needed, according to new research from the University of Aberdeen......»»
The future of cyber insurance: Meeting the demand for non-attack coverage
In this Help Net Security interview, Michael Daum, Head of Global Cyber Claims for Allianz Commercial, discusses the significant rise in cyber claims in 2024, driven by an increase in data breaches and ransomware attacks. Daum highlights the need for.....»»
Achieving peak cyber resilience
Climbing Mount Everest isn’t a feat for the faint hearted. Extreme weather, dangerous terrain and acclimatization requirements make the trek challenging for even the most experienced climbers. It’s estimated that the expedition takes more than tw.....»»
Facing the uncertainty of cyber insurance claims
Cyber insurance is vital for companies mitigating cyber risks, but the industry still encounters significant challenges, including shifting policy requirements and uncertainty around coverage in the event of an incident. As cyberattacks continue to c.....»»
Early Black Friday smartwatch deals 2024: Apple, Samsung, Garmin
With so many Cyber Monday smartwatch deals around, we've picked out all the best including highly sought after Apple Watches, Garmins, and more......»»
New technology illustrates bacterial "hibernation states"
Like hibernating bears, certain bacterial cells have the ability to shift into a "low-power" metabolic state in which they can stably survive without growing. This state is often seen in the context of antibiotic-resistant infections as bacteria form.....»»
Both Harris and Trump have records on space policy. An expert examines where they differ
The next president of the United States could be the first in that office to accept a phone call from the moon and hear a woman's voice on the line. To do so, they'll first need to make a series of strategic space policy decisions. They'll also need.....»»
Effective strategies for measuring and testing cyber resilience
In this Help Net Security interview, Detective Superintendent Ian Kirby, CEO of the National Cyber Resilience Centre Group (NCRCG), discusses the emerging cyber threats and strategies organizations can use to increase cyber resilience. He emphasizes.....»»
New ice core data provide insight into climate "tipping points" during the last Ice Age
A changing climate triggers a sudden shift in ocean circulation, creating weather havoc and plunging Earth into an abrupt new Ice Age......»»
Tech can help kids connect with nature and go outdoors—here are tips to make it work
Young children's lives are increasingly spent indoors. They have less access to green spaces, their parents are concerned about safety, and there's also the draw of digital entertainment. This shift away from the natural world has been evocatively na.....»»
Microsoft lost some customers’ cloud security logs
Microsoft has lost several weeks of cloud security logs that its customers rely on to spot cyber intrusions. What happened As reported by Business Insider earlier this month, Microsoft privately notified affected customers of this incident and told t.....»»
Arrested: USDoD, Anonymous Sudan, SEC X account hacker
Law enforcement agencies have arrested suspects involved in cyber attacks claimed by USDoD and Anonymous Sudan, as well as a person involved in the hacking of SEC’s X (Twitter) account. USDoD On Wednesday, the Brazilian federal police (Policia.....»»
Daily 5 report for Oct. 17: GM clarifies "virtual by 2025" goal
A statement from General Motors said the automaker doesn't have plans to shift its entire development system to virtual at this point......»»
China cyber pros say Intel is installing CPU backdoors on behalf of NSA
China says the NSA has been installing backdoors in Intel CPUs for over a decade......»»
The role of compromised cyber-physical devices in modern cyberattacks
Cyber-physical devices are increasingly getting compromised and leveraged by criminal groups and state-sponsored threat actors. Fyodor Yarochkin, Senior Threat Solution Architect with Trend Micro, believes that getting a better understanding of attac.....»»
Fake Google Meet pages deliver infostealers
Users of the Google Meet video communication service have been targeted by cyber crooks using the ClickFix tactic to infect them with information-stealing malware. Fake Google Meet video conference page with malicious ClickFix pop-up (Source: Sekoia).....»»
Tesla bets on AI for autonomous vehicles, humanoid robots in major strategy shift
Tesla is using AI to create potentially lucrative products — autonomous cars and humanoid robots — in a bid by CEO Elon Musk to make it the most valuable company in the world......»»