Malwarebytes ThreatDown helps organizations to overpower threats
Malwarebytes launched ThreatDown, the product family that protects IT-constrained organizations with effective, easy-to-use cybersecurity. Formerly named Malwarebytes for Business, ThreatDown solutions are purpose-built to overpower threats, while em.....»»
Fleet expands its GitOps-focused device management technology to iPhones and iPads
Fleet, the open-source device management platform, has announced new support for iOS devices. This update brings its GitOps-focused approach to mobile devices for the first time. This means organizations can manage their entire fleet of devices, incl.....»»
New infosec products of the week: September 27, 2024
Here’s a look at the most interesting products from the past week, featuring releases from Absolute, ArmorCode, Bitdefender, Guardsquare, Malwarebytes, NETGEAR, and Nudge Security. Bitdefender debuts GravityZone PHASR, enhancing security through us.....»»
3 tips for securing IoT devices in a connected world
IoT devices have become integral to how many organizations operate. From Smart TVs in conference rooms to connected sensors and wireless security cameras, these connected devices are now a fixture in the modern workplace. They also, however, present.....»»
Sloth survival under threat due to climate change, study finds
A new PeerJ study has revealed that sloths, the famously slow-moving creatures of Central and South America, may face existential threats due to climate change. The research, conducted by scientists studying the metabolic response of sloths to rising.....»»
How large language models are changing collective intelligence
Within teams, organizations, markets and online communities, ideas from a larger group can help to solve complex problems. Large language models (LLMs) are emerging as powerful tools to unlock even greater potential. Picture an online forum where tho.....»»
Tails OS joins forces with Tor Project in merger
The organizations have worked closely together over the years. Enlarge (credit: The Tor Project) The Tor Project, the nonprofit that maintains software for the Tor anonymity network, is joining forces with Tails, the mak.....»»
Scientists uncover a critical component that helps killifish regenerate their fins
Spontaneous injuries like the loss of a limb or damage to the spinal cord are impossible for humans to repair. Yet, some animals have an extraordinary capacity to regenerate after injury, a response that requires a precise sequence of cellular events.....»»
Compliance management strategies for protecting data in complex regulatory environments
In this Help Net Security interview, Andrius Buinovskis, Head of Product at NordLayer, discusses how organizations can assess their compliance management and ensure they meet regulatory requirements. Buinovskis also addresses the challenges of managi.....»»
Zilla Security simplifies identity governance and administration for organizations
Zilla Security launched AI-powered modern IGA platform, which includes Zilla AI Profiles and significantly enhanced provisioning capabilities. These innovations tackle the long-standing challenge of managing hundreds of roles or group membership rule.....»»
How social structure influences the way people share money
People around the globe often depend on informal financial arrangements, borrowing and lending money through social networks. Understanding this sheds light on local economies and helps fight poverty......»»
Current economic system fails examination by sustainability experts
Our current economic system is based on poor science and should not be used to guide government decision-making when faced with threats to existence like climate change. That's the conclusion of a new paper led by UNSW Sydney sustainability scientist.....»»
Ancient DNA helps uncover the Iberian lynx"s potential secret weapon against extinction
Many large mammals have lost genetic diversity, often thanks to the actions of people shrinking their populations. The implications can be severe because without genetic diversity, a population does not have a "genetic database" to fall back on to ad.....»»
Research reveals best conditions for storing graphene oxide
A research team from Skoltech and other scientific organizations conducted a study to determine which conditions are the most suitable for storing graphene oxide—a promising material that can be used for manufacturing composite materials, gas senso.....»»
The "publish or perish" mentality is fueling research paper retractions—and undermining science
When scientists make important discoveries, both big and small, they typically publish their findings in scientific journals for others to read. This sharing of knowledge helps to advance science: it can, in turn, lead to more important discoveries......»»
NICE Actimize Fraud Investigation combats fraud and financial crime
NICE Actimize launched AI-powered Fraud Investigations solution that facilitates end-to-end fraud management capabilities from detection to investigations. Explicitly designed to enable fraud investigations post detection, the new solution helps fina.....»»
Cloudflare helps secure popular messaging applications
Cloudflare announced a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. When using end-to-end encryption messaging applications, a public-private key exchange encrypts messages to prot.....»»
How cyber compliance helps minimize the risk of ransomware infections
Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses. To help businesses combat ransomware and other threats,.....»»
Future-proofing cybersecurity: Why talent development is key
In this Help Net Security interview, Jon France, CISO at ISC2, discusses cybersecurity workforce growth. He outlines organizations’ challenges, such as budget constraints and limited entry-level opportunities. France also points to the urgent n.....»»
MFA bypass becomes a critical security issue as ransomware tactics advance
Ransomware is seen as the biggest cybersecurity threat across every industry, with 75% of organizations affected by ransomware more than once in the past 12 months – a jump from 61% in 2023, according to SpyCloud. Session hijacking surges as ma.....»»
Climate change is a pollution problem, and countries have stopped similar threats before—think DDT and acid rain
Climate change can seem like an insurmountable challenge. However, if you look closely at its causes, you'll realize that history is filled with similar health and environmental threats that humanity has overcome......»»