Overcoming GenAI challenges in healthcare cybersecurity
In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on patient privacy. What are the key cybersecurity challenges in healthcare in the.....»»
What lies ahead for AI in cybersecurity
AI is becoming recognized for its potential to strengthen cybersecurity measures and tackle the skills gap across various sectors. Its ability to streamline data management processes boosts efficiency and strengthens security protocols. However, the.....»»
Guide for selecting the right GRC framework, EU edition
Governance, risk, and compliance frameworks are critical. They enable cybersecurity professionals to accurately identify an organization’s risk posture, align business and strategic objectives with technology, and meet compliance responsibilities......»»
Stellantis poised to secure Italian approval to sell stake in Comau robotics unit, report says
One Equity, which invests in businesses in the industrial, healthcare and technology industries in the U.S. and Europe, is expected to take a 50.1 percent stake in the robotics unit......»»
New research shows legal challenges to climate action on the rise
As the global push towards low-carbon societies accelerates, a new study reveals that justice concerns are increasingly surfacing in legal disputes over climate policies and projects. This phenomenon, described as "just transition litigation," emphas.....»»
iPhone Mirroring is currently a privacy and legal risk on work Macs
One of the new features of iOS 18 and macOS Sequoia is iPhone Mirroring – but using this with a personal iPhone on a work Mac currently creates a privacy risk for employees, and a legal risk for businesses. The problem, as cybersecurity company.....»»
How hybrid workforces are reshaping authentication strategies
In this Help Net Security interview, Brian Pontarelli, CEO at FusionAuth, discusses the evolving authentication challenges posed by the rise of hybrid and remote workforces. He advocates for zero trust strategies, including MFA and behavioral biometr.....»»
SimSpace’s OT content enhancements improve critical infrastructure security
SimSpace announced its enhanced OT (Operational Technology) content, now offering more realistic and high-fidelity training and emulation. As OT cybersecurity becomes increasingly critical for industries relying on operational systems, SimSpace has i.....»»
OTAVA S.E.C.U.R.E. Score simplifies cybersecurity strategy for businesses
OTAVA introduced the OTAVA S.E.C.U.R.E. Score to help businesses further improve their security posture. The S.E.C.U.R.E. Score is a dynamic metric that assesses vulnerabilities, and makes recommendations on how to close security gaps and minimize ri.....»»
Daily 5 report for Oct. 7: Stellantis, already facing challenges, signals it"ll play hardball with the UAW
Once again, Stellantis is dominating our headlines with its latest challenge: playing hardball with the UAW. Last last week Stellantis filed nine lawsuits against the union, the first one in U.S. District Court in California, seeking to block any.....»»
Smaller crossovers, pickups outpace U.S. market in Q3 as affordability challenges remain
Light-vehicle sales slid 2.4 percent in the third quarter, according to preliminary data from the Automotive News Research & Data Center......»»
Smaller crossovers, pickups outpace market in Q3 as affordability challenges remain
Light-vehicle sales slid 2.4 percent in the third quarter, according to preliminary data from the Automotive News Research & Data Center......»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Traces of antimatter in cosmic rays reopen the search for "WIMPs" as dark matter
One of the great challenges of modern cosmology is to reveal the nature of dark matter. We know it exists (it constitutes more than 85% of the matter in the universe), but we have never seen it directly and still do not know what it is......»»
Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and Infrastructure Security Agency has confirmed by adding the bug to its Known Exploited V.....»»
Unique IDs for individual (digital) specimens from natural history museums streamline and future-proof science
The wealth of data hosted in natural history collections can contribute to finding a response to global challenges ranging from climate change to biodiversity loss to pandemics. However, today's practices of working with collected bio- and geodiversi.....»»
15% of office workers use unsanctioned GenAI tools
Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. Understanding workplace behavior key to s.....»»
Whitepaper: Reach higher in your career with cloud security
The cybersecurity skills gap presents ongoing challenges worldwide, so organizations are scrambling to fill cloud security positions. Having a subject matter expert on staff qualified to advise on cloud security requirements is more important now tha.....»»
Chemist challenges traditional views on crystal growth
Remember that old high school chemistry experiment where salt crystals precipitate out of a saltwater solution—or maybe the one where rock candy crystals form from sugar water? It turns out that your understanding of how crystals formed in those so.....»»
Venafi helps organizations solve more machine identity security problems
Venafi introduced new product capabilities in its Control Plane for Machine Identities. This latest version of the Venafi Control Plane will enable security and platform teams to address the most critical machine identity security challenges and help.....»»
Balbix D3 accelerates vulnerability mitigation
Balbix unveild Balbix D3, the latest version of its exposure management platform. Packed with AI innovations, Balbix D3 is designed to help cybersecurity teams mitigate critical exposures faster than ever before, protecting organizations against emer.....»»