Miscategorization fuels discrimination within organizations and workplaces, say researcher
How does discrimination arise? A new paper by Muhammed Alperen Yasar, Ph.D. student at Ca' Foscari University of Venice and Paris I Pantheon-Sorbonne University offers valuable insights into the development of discriminatory behaviors in organization.....»»
Experiments show power-motivated social media users disproportionately spread misinformation
People motivated by power and the desire to influence others are more likely to share fake news posts on social media, according to a new study led by a UCL researcher......»»
Bleached reefs could sink fishing yields, study warns
What does a decline in healthy coral reefs mean for fisheries? A new study published in Marine Resource Economics, led by the Woods Hole Oceanographic Institution (WHOI), examines the correlation between fish yield and live coral habitats. Researcher.....»»
Easy tips to save money don"t always work. Here"s why.
Amid spending season and a plethora of articles listing ways to control your budget during these holidays, a Deakin University researcher warns there are no quick and easy solutions......»»
Machine learning offers new framework for heterogeneous catalyst data analysis
Machine learning (ML) transforms the design of heterogeneous catalysts, traditionally driven by trial and error due to the complex interplay of components. BIFOLD researcher Parastoo Semnani from the ML group of BIFOLD Co-Director Klaus-Robert Mülle.....»»
Ransomware in 2024: New players, bigger payouts, and smarter tactics
In 2024, ransomware remained the top cybersecurity threat to organizations worldwide. New groups filled the void left by law enforcement crackdowns, targeting businesses with record-breaking ransom demands and sophisticated tactics. In this article,.....»»
Leadership skills for managing cybersecurity during digital transformation
In this Help Net Security interview, Dan Lohrmann, CISO at Presidio, discusses the need for organizations to rethink their leadership and operational strategies and the cybersecurity risks they have to deal with during digital transformation. The pos.....»»
Boomerang workers: helpful returnees or resented colleagues?
While movement from job to job throughout one's career is expected, little research has evaluated the effects of hiring boomerang workers—those who return to a former employer. A new study by a University of California, Davis, researcher and collea.....»»
Research reveals mental health"s impact on parole rearrest likelihood
Individuals who have a mental illness are more likely to be rearrested after being released from prison than those without a mental illness, according to a new study by a University at Buffalo School of Social Work researcher......»»
Stairwell Core boosts threat intelligence for security teams
Stairwell announces Stairwell Core, which enables organizations to privately collect, store, and continuously reassess executable files so they can confidently determine if malware has affected their systems. Core offers customers an accessible entry.....»»
BeyondTrust fixes critical vulnerability in remote access, support solutions (CVE-2024-12356)
BeyondTrust has fixed an unauthenticated command injection vulnerability (CVE-2024-12356) in its Privileged Remote Access (PRA) and Remote Support (RS) products that may allow remote code execution, and is urging organizations with on-premise install.....»»
Household slavery: "An overlooked method of enslaving people"
When discussing enslavement, attention often focuses on Africans forcibly shipped to South America. Researcher Timo McGregor's new Veni research sheds light on a lesser-known method, whereby indigenous populations were enslaved through the households.....»»
Ammonia production goes green: Biomethane approach offers net-zero emissions
Using biomethane to produce ammonia, a crucial chemical in agriculture, could drastically reduce the climate impact of the process. In a study published in One Earth, researcher Robert Istrate shows it's even possible to make ammonia production net-z.....»»
Moral judgments shape everyday consumption practices, says research
In a new study, a Florida State University marketing researcher and her colleagues have revealed a complex moral landscape underlying everyday consumption practices, particularly relating to self-care, just in time for the holiday shopping season......»»
New climate chemistry model finds "non-negligible" impacts of potential hydrogen fuel leakage
As the world looks for ways to stop climate change, much discussion focuses on using hydrogen instead of fossil fuels, which emit climate-warming greenhouse gases (GHGs) when they're burned. The idea is appealing. Burning hydrogen doesn't emit GHGs t.....»»
With DORA approaching, financial institutions must strengthen their cyber resilience
The clock is ticking for financial institutions across the EU as the January 17, 2025, deadline for the Digital Operational Resilience Act (DORA) approaches. This regulation will reshape how organizations in the financial sector approach cybersecurit.....»»
Airborne observations identify major source of US landfill methane emissions
A team has found via testing from airplanes that landfill work faces tend to be responsible for the biggest share of methane emissions in U.S. landfills. Their findings are published in the journal Environmental Science and Technology. The researcher.....»»
The secret to living to 110? Bad record-keeping, researcher says
Most of what we know about humans living to very old age is based on faulty data, including the science behind the "blue zones" famous for having a high proportion of people over 100, according to one researcher......»»
Celigo Private Cloud enhances security and connectivity
Celigo introduced Celigo Private Cloud, a transformative solution offering enterprises fully private automation instances. Designed for businesses that prioritize enhanced security, control, and compliance, Celigo Private Cloud empowers organizations.....»»
Rubrik Turbo Threat Hunting accelerates cyber recovery
As organizations around the world struggle with extended downtime and revenue loss due to widespread cyberattacks, Rubrik announces Rubrik Turbo Threat Hunting. This new feature is designed to accelerate cyber recovery and enables organizations to lo.....»»
FuzzyAI: Open-source tool for automated LLM fuzzing
FuzzyAI is an open-source framework that helps organizations identify and address AI model vulnerabilities in cloud-hosted and in-house AI models, like guardrail bypassing and harmful output generation. FuzzyAI offers organizations a systematic appro.....»»