Organizations should prepare for the inevitability of cyberattacks on their infrastructure
Organizations reliance on technology has contributed to the fact that their attack surface has grown in size and complexity, according to Armis. Global organizations are facing an unprecedented level of cyber risk due to blind spots in their environm.....»»
Lion brothers in search of mates just set a record for longest-known swim
Brothers Jacob and Tibu braved hungry hippos and crocodiles to make the crossing. Enlarge / The intrepid three-legged lion Jacob and his brother Tibu prepare for a hunt. (credit: Alexander Braczkowski) On February 4, sc.....»»
How to design a third-party risk management framework
Most organizations focus on securing routers, servers, firewalls, and other endpoints, but threats can also arise from unfamiliar sources such as third-party networks, which can be used by hackers to attack an organization. Through a strong TPRM fram.....»»
CDK CEO pledges to compensate dealers after ransomware event
CDK CEO Brian MacDonald promised to dealers in a letter that they would receive "some financial relief" for interruptions stemming from the June 19 cyberattacks......»»
Lion brothers in search of mates just set a record for longest known swim
Brothers Jacob and Tibu braved hungry hippos and crocodiles to make the crossing. Enlarge / The intrepid three-legged lion Jacob and his brother Tibu prepare for a hunt. (credit: Alexander Braczkowski) On February 4, sc.....»»
Kanguru’s hardware-based internal SEDs secure data on laptops, tablets, and computers
Kanguru has unveiled its latest security product line aimed at helping organizations safeguard sensitive data on laptops, tablets, and computers. The new hardware-based internal Self-Encrypting Drives (SEDs) are high-performance solid state drives de.....»»
3 of the most successful US tech companies to work at right now
By Amanda Kavanagh It’s been a buzzy year for Big Tech in America. As the ongoing AI boom continues, large organizations are hurtling towards valuations … The post 3 of the most successful US tech companies to work at right now appeared.....»»
CDK cyberattack and Hurricane Beryl: Texas dealerships weather a double blow
Keating Automotive Group in Texas faced the double disruptions of CDK cyberattacks and Hurricane Beryl. Said owner Bean Keating: "What other choice do you have other than to roll with the punches?".....»»
Enzoic Global Partner Program helps combat dark web exposures
Enzoic has unveiled its Enzoic Global Partner Program to help organizations strengthen their security posture in response to the evolving cybersecurity landscape. Participants have access to Enzoic’s award-winning threat intelligence solutions whic.....»»
Pentera updates RansomwareReady to secure Linux environments
Pentera announced a major update to its RansomwareReady product, enabling customers to proactively test the security of their Linux environments. With this addition, Pentera empowers organizations to adopt proactive measures against the world’s.....»»
Security Compass helps organizations integrate GenAI into their applications
Security Compass announced its SD Elements 2024.2 product release. This release expands on the platform’s AI/ML security content designed to help organizations seamlessly integrate GenAI into their applications while ensuring they are secure and co.....»»
Auroras caused by head-on blows to Earth"s magnetic field could damage critical infrastructure, scientists say
Auroras have inspired myths and portents for millennia—but only now, with modern technology dependent on electricity, are we appreciating their true power. The same forces which cause auroras also cause currents that can damage infrastructure which.....»»
Greater focus needed on how existing international law can prevent increasing militarization of outer space, says study
There is a pressing need for countries and international organizations to understand better how existing international law can help them address serious concerns about the militarization of outer space, a new study says......»»
Best Prime Day 4K TV deals in 2024: Sony, Samsung, TCL and more
This year's Prime Day 4K TV deals are about a week away. If you want to prepare yourself for Amazon's shopping event, here's everything that you need to know......»»
Live talk at 11 a.m. EDT July 10: What we learned from the CDK cyberattacks
Judy Farcus Serra, COO of Headquarter Automotive, and Justin Shanken, CEO of Black Breach, will talk about the CDK Global cyberattacks with Automotive News Executive Editor Jamie Butters and Staff Reporter Mark Hollmer......»»
Best Prime Day MacBook deals in 2024: Air, M1, M2, M3
Are you looking forward to this year's Prime Day MacBook deals? We'll help you prepare for the upcoming shopping holiday so that you can score big discounts......»»
Sonic cautions Q2 earnings will see hit from CDK cyberattacks
The June 19 cyberattacks led CDK to shut down its dealership management system and related software for more than 15,000 customers......»»
What do research organizations think about open access publishing?
A new report by COAlition S presents findings and recommendations on open publishing (open access) based on a large consultation among 11,600 researchers from around the world. The report, "'Towards Responsible Publishing': Findings from a global sta.....»»
What We Saw at RAPID+TCT 3D Printing Con
The annual RAPID+TCT conference (named after the two media organizations that run it) bills itself as North America’s largest additive manufacturing and industrial 3D printing event. This year it was at the Los Angeles Convention Center on June 25.....»»
SpaceX video teases potential Starship booster “catch” on next flight
A booster landing would be a calculated risk to SpaceX's launch tower infrastructure. Enlarge / In early June, the rocket for SpaceX's fourth full-scale Starship test flight awaits liftoff from Starbase, the company's private lau.....»»
To guard against cyberattacks in space, researchers ask “what if?”
A hack on satellites could cripple much of our digital infrastructure. Enlarge / Complex space systems like the International Space Station could be vulnerable to hackers. (credit: NASA) If space systems such as GPS were.....»»