Kasten K10 V6.0 enables organizations to create proactive ransomware protection strategies
Kasten by Veeam released its new Kasten K10 V6.0 Kubernetes data protection platform. The new release includes features that will help customers scale their cloud native data protection more efficiently, better protect their applications and data aga.....»»
Nanopillars create tiny openings in the nucleus without damaging cells
Imagine trying to poke a hole in the yolk of a raw egg without breaking the egg white. It sounds impossible, but researchers at the University of California San Diego have developed a technology that performs a similarly delicate task in living cells.....»»
Harmonic Security raises $17.5 million to improve data security for organizations
Harmonic Security has secured $17.5 million in Series A funding to bring its “zero-touch data protection” capabilities to enterprises. Total funding has now reached more than $26 million since the company launched in October last year with enterp.....»»
Balbix D3 accelerates vulnerability mitigation
Balbix unveild Balbix D3, the latest version of its exposure management platform. Packed with AI innovations, Balbix D3 is designed to help cybersecurity teams mitigate critical exposures faster than ever before, protecting organizations against emer.....»»
Catalogic DPX 4.11 strengthens data security
Catalogic Software announced the newest version of Catalogic DPX, the company’s enterprise data protection software. DPX 4.11 provides enhanced capabilities in data recovery and data security. With this new release, Catalogic DPX continues to incre.....»»
Enveil enables organizations to securely train machine learning models
Enveil announced the expansion of the core technologies supported by its ZeroReveal Machine Learning product, an enhancement that will further broaden and diversify the range of customer-driven use cases the solution can address. By allowing customer.....»»
What bots mean for businesses and consumers
Simple bots have existed since the early to mid-2000s when organizations had no means to protect themselves or their website’s users from them. Yet today, despite having tools to protect against these simple bots, two in three organizations have ma.....»»
Enhancing firewall management with automation tools
In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to effectively balance security needs with network performance. What factors should o.....»»
Inadequate compensation for lost or downgraded protected areas threatens global biodiversity: Study
Conservation scientists at the National University of Singapore (NUS) have highlighted substantial gaps in the compensation for lost or downgraded protected areas. These gaps risk undermining global efforts for the protection of biodiversity and thre.....»»
Halcyon offers ransomware protection for Linux environments
As an integral part of the Halcyon Anti-Ransomware Platform, Halcyon Linux offers protection against ransomware attacks targeting Linux systems. While ransomware operators were once almost exclusively focused on targeting Windows environments, the in.....»»
Use Windows event logs for ransomware investigations, JPCERT/CC advises
The JPCERT Coordination Center – the first Computer Security Incident Response Team established in Japan – has compiled a list of entries in Windows event logs that could help enterprise defenders respond to human-operated ransomware atta.....»»
Breeder who tried to create enormous trophy sheep jailed in US
A man who tried to breed enormous hybrid sheep using genetic material from endangered animals so he could sell them to trophy hunting ranches has been sentenced to six months in prison, the US Department of Justice said Monday......»»
Password management habits you should unlearn
Despite advancements in security technology, many individuals and organizations continue to rely on outdated and vulnerable authentication methods, leaving themselves exposed to cyber threats. This ongoing reliance on insecure methods has led to a st.....»»
Study: 1 of every 4 employees of commercial organizations has withheld inventions from their employer
A new study from the Coller School of Management at Tel Aviv University sheds light for the first time on an important issue in the business world: employees withholding their inventions from the companies they work for......»»
Ransomware attackers hop from on-premises systems to cloud to compromise Microsoft 365 accounts
Storm-0501, an affiliate of several high-profile ransomware-as-a-service outfits, has been spotted compromising targets’ cloud environments and on-premises systems. “Storm-0501 is the latest threat actor observed to exploit weak credentia.....»»
DNA technology enables molecular monitoring for marine change and threats
New DNA technology promises to improve efforts to monitor marine life in the Southern Ocean, and detect the presence of non-native marine species close to Antarctica......»»
New mission to create total solar eclipses in space
A UK team of researchers including UCL's Professor Lucie Green are working on the launch of a spacecraft mission that will allow us to view the sun's atmosphere in more detail than ever before......»»
Researchers use carbon nanotube derivatives to strengthen recyclable plastics
Reducing the environmental impact caused by plastics can be addressed through different strategies, such as the manufacture of more durable plastics or recycling. In general, there are two main types of plastics. The first is thermoplastics, which ca.....»»
3D-printed setup enables fast and accurate virus detection
A new method for quickly and accurately detecting nanoparticles and viruses marks a major advancement in virus detection technology, merging confocal fluorescence microscopy with microfluidic laminar flow. Unlike traditional PCR methods, which are sl.....»»
Discovery of 3,775-year-old preserved log supports "wood vaulting" as a climate solution
A new study published in the journal Science suggests that an ordinary old log could help refine strategies to tackle climate change......»»
Businesses turn to private AI for enhanced security and data management
In this Help Net Security interview, Joe Baguley, CTO EMEA at Broadcom, shares insights on private AI and its significance in data security. He explains how it helps organizations maintain control over sensitive information while addressing the compl.....»»