One CMO’s journey with risk management and compliance
Without active involvement from business unit leaders across the company in marketing, human resources, sales and more, a company can never have a healthy risk-aware culture. Gina Hortatsos Contributor.....»»
The case for enterprise exposure management
For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and.....»»
Nuclear rockets could travel to Mars in half the time, but designing the reactors that would power them isn"t easy
NASA plans to send crewed missions to Mars over the next decade—but the 140 million-mile (225 million-kilometer) journey to the red planet could take several months to years round trip......»»
Study of global primate populations reveals predictors of extinction risk
An international team of biologists, planetary scientists and conservationists has conducted a large-scale study of non-human primate populations around the world to gauge their risk of extinction due to climate change......»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Miami-Dade study questions reliability of land surface temperature for heat risk assessment
A study published in the journal PLOS Climate on October 2, 2024, examines the effectiveness of using land surface temperatures (LSTs) as proxies for surface air temperatures (SATs) in subtropical, seasonally wet regions......»»
New species of clearwing moth from Guyana discovered in Wales
A new species of moth has been described far away from home following a cross-continent detective journey that included Natural History Museum scientists from separate fields, a budding young ecologist with a knack for community science, a globe-trot.....»»
Spotting AI-generated scams: Red flags to watch for
In this Help Net Security interview, Andrius Popovas, Chief Risk Officer at Mano Bank, discusses the most prevalent AI-driven fraud schemes, such as phishing attacks and deepfakes. He explains how AI manipulates videos and audio to deceive victims an.....»»
Daily 5 report for Oct. 2: Stellantis woes raise red flag among weaker Q3 U.S. sales results
The company's disappointing Q3 sales results reinforce the uncomfortable questions already facing Stellantis management......»»
An International Space Station Leak Is Getting Worse—and Keeping NASA Up at Night
A NASA inspector general report gives new details on a leak that has plagued the ISS for five years, and reveals that the agency considers it the highest-level risk......»»
PlexTrac unveils new capabilities to prioritize proactive security remediation
PlexTrac announced significant enhancements to its platform. These updates are designed to help enterprises and security service providers harness proactive security by offering business context, automating risk scoring to focus on what matters most,.....»»
Metomic Data Classification automates complex data management workflows
Metomic released its Data Classification solution, making it possible to discover, classify and secure sensitive data at scale across Google Workspaces. Metomic’s latest innovation is an AI-powered tool that automates complex data management workfl.....»»
New method quantifies single-cell data"s risk of private information leakage
Access to publicly available human single-cell gene expression datasets, or scRNA-seq datasets, has significantly enhanced researchers' understanding of both complex biological systems and the etymology of various diseases. However, the increase in a.....»»
Concentric AI helps monitor and remediate risky Copilot activity
Concentric AI announced an AI-based DSPM functionality that identifies data access and activity risk from Copilot requests. With this launch, enterprises can now for leverage AI-driven DSPM to track, monitor and seamlessly enforce access governance a.....»»
Smoke from megafires puts orchard trees at risk: Effects last months, reducing nut yields
Long-term smoke exposure from massive wildfires lowers the energy reserves of orchard trees and can cut their nut production by half, researchers at the University of California, Davis, found. The smoke can affect trees for months after a megafire, d.....»»
Balbix D3 accelerates vulnerability mitigation
Balbix unveild Balbix D3, the latest version of its exposure management platform. Packed with AI innovations, Balbix D3 is designed to help cybersecurity teams mitigate critical exposures faster than ever before, protecting organizations against emer.....»»
SAFE X equips CISOs with integrated data from all their existing cybersecurity products
Safe Security launched SAFE X, a generative AI-powered mobile app for CISOs. SAFE X delivers CISOs real-time business impact insights into their cybersecurity posture, enabling better decision-making and risk prioritization. CISOs often invest millio.....»»
Enhancing firewall management with automation tools
In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to effectively balance security needs with network performance. What factors should o.....»»
Inadequate compensation for lost or downgraded protected areas threatens global biodiversity: Study
Conservation scientists at the National University of Singapore (NUS) have highlighted substantial gaps in the compensation for lost or downgraded protected areas. These gaps risk undermining global efforts for the protection of biodiversity and thre.....»»
Dragos acquires Network Perception to boost security in OT environments
Dragos announced the acquisition of Network Perception, makers of NP-View, a network visualization platform for OT networks. The acquisition will bolster the Dragos Platform with industry-leading OT network visibility along with compliance and segmen.....»»
Password management habits you should unlearn
Despite advancements in security technology, many individuals and organizations continue to rely on outdated and vulnerable authentication methods, leaving themselves exposed to cyber threats. This ongoing reliance on insecure methods has led to a st.....»»