NightDragon and CyberKnight strengthen cybersecurity in the Middle East, Turkey and Africa
NightDragon announced a new strategic partnership with CyberKnight to continue the international expansion capabilities of its portfolio companies and bring the latest CSSP innovations to customers in the Middle East, Turkey, Africa (META) and other.....»»
From antiquity to adaptation: Tracing the genetic journey of east Asian chestnut varieties
Uncovering the genetic saga of Castanea trees, a study maps their evolutionary journey and local climate adaptations. This research reveals the genetic markers and molecular mechanisms that have allowed these nut fruit trees to adapt and flourish acr.....»»
S.Africa plan to "bomb" mice that eat albatrosses alive
Conservationists said Saturday that they plan to bomb a remote South African island with tons of pesticide-laced pellets to kill mice that are eating albatrosses and other seabirds alive......»»
South Africa"s scarce water needs careful management—study finds smaller, local systems offer more benefits
South Africa is a water-scarce country, the 30th driest in the world. Using water wisely will become more and more important as the population grows and droughts related to climate change increase. A lack of clean, fresh water has a negative impact o.....»»
Bird species are disappearing at an alarming rate in Kenya, study finds
Sub-Saharan Africa has a vast amount of uncultivated, arable land—about 2 million km2, accounting for about 50% of the global total. This land is a critical habitat for many animal species, including birds......»»
After cybersecurity lab wouldn’t use AV software, US accuses Georgia Tech of fraud
Researchers allegedly found security protocols "burdensome." Enlarge (credit: Georgia Tech) Dr. Emmanouil "Manos" Antonakakis runs a Georgia Tech cybersecurity lab and has attracted millions of dollars in the last few ye.....»»
Atomfall finds a middle ground between S.T.A.L.K.E.R. and Fallout
After a hands-on demo, we're intrigued by Atomfall, which mashes Fallout and S.T.A.L.K.E.R. up into one exciting postapocalyptic RPG......»»
Apple auction includes Steve Jobs’ ‘middle finger to IBM leather jacket,’ Polaroid ID badge, more [U]
The latest Apple memorabilia auction is open with a range of rare items. While the auction includes a valuable Apple-1 estimated to bring in over $300,000, other unique items include Steve Jobs’ famous “middle finger to IBM leather jacket,” the.....»»
The Lord of the Rings: The War of the Rohirrim trailer previews journey back to Middle-earth
Travel back to Middle-earth 200 years before the Lord of the Rings trilogy in the first trailer for The Lord of the Rings: The War of the Rohirrim. .....»»
Deviations in particle interactions point to the existence of new bosons
Professors Andreas Crivellin of the University of Zurich and Bruce Mellado of the University of the Witwatersrand and iThemba LABS in South Africa have documented deviations in the way particles interact. These deviations are inconsistent in comparis.....»»
Fighting coastal erosion with electricity
New research from Northwestern University has systematically proven that a mild zap of electricity can strengthen a marine coastline for generations—greatly reducing the threat of erosion in the face of climate change and rising sea levels......»»
GenAI models are easily compromised
95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manip.....»»
Why C-suite leaders are prime cyber targets
Senior executives are prime targets for cybercriminals, with 72% of surveyed cybersecurity professionals in the US reporting that cyberattacks have targeted this group in the past 18 months. This trend, highlighted in GetApp’s 2024 Executive Cybers.....»»
"Internet of fish" empowering Lake Victoria women
Along the shores of East Africa's Lake Victoria, in Kenya, women fisherfolk including those known for being victims of sexual exploitation, are harnessing the Internet of Things (IoT) to help them counter their abusers while enhancing their incomes,.....»»
Cybersecurity jobs available right now: August 21, 2024
Associate Cybersecurity Operations Officer UNICC | USA | On-site – View job details The Center aims to provide trusted ICT services and digital business solutions. You will work under the direct supervision and guidance of the Head of.....»»
Heterogeneous occurrence of evergreen broad-leaved forests revealed by plant fossils in East Asia
Evergreen broad-leaved forests (EBLFs) are the most characteristic biomes in East Asia. They assume a fundamental role in the biodiversity function and ecosystem services of the East Asiatic floristic kingdom. Hence, understanding the historical dyna.....»»
Mosquitoes use gut bacteria to fight the malaria they transmit—scientists are exploring how to use this
The months of September to May are an unfortunate season in South Africa: malaria season. The mosquito-borne disease is found in the north-eastern districts of KwaZulu-Natal, Mpumalanga and Limpopo provinces......»»
Fossil hotspots in Africa obscure a more complete picture of human evolution, study says
Much of the early human fossil record originates from just a few places in Africa, where favorable geological conditions have preserved a trove of fossils used by scientists to reconstruct the story of human evolution......»»
Strategies for security leaders: Building a positive cybersecurity culture
Culture is a catalyst for security success. It can significantly reduce cybersecurity risks and boost cybersecurity resilience of any organization. Culture can also greatly enhance the perceived value, relevance and reputation of the cybersecurity fu.....»»
How a mix of old and new techniques produced a superior maize harvest in a dry part of South Africa
New research into rural small-scale farms in South Africa's North West province has found that climate-smart farming techniques lead to a better maize yield, a more regular supply of food for the farmers, and a wider variety of crops......»»
Protecting academic assets: How higher education can enhance cybersecurity
Cyber attacks against higher education institutions increased by 70% in 2023. This is largely due to legacy endpoint security management and practices, limited IT support staff, and overwhelming amounts of data, much of which is PII (personally ident.....»»