Overcoming the pressures of cybersecurity startup leadership
In this Help Net Security interview, Kunal Agarwal, CEO at Dope Security, offers a look into the CEO’s leadership philosophy, the process of building a high-caliber team, and the unique challenges of navigating a startup in the tech industry. D.....»»
Practical strategies to build an inclusive culture in cybersecurity
In this Help Net Security interview, Alona Geckler, Chief of Staff, SVP of Business Operations at Acronis, shares her insights on the diversity environment in the cybersecurity and IT industries. She discusses the progress made over the past two deca.....»»
Tim Cook heads to China for supply chain talks with premier
Apple CEO Tim Cook has returned to China for discussions with premier Li Qiang, in discussions to aid both the global supply chain and the Chinese economy.Apple CEO Tim Cook - Image credit: AppleApple's leadership frequently makes visits to China and.....»»
A former Orion manager has surprisingly credible plans to fly European astronauts
"I know it's super hard, and I know it was crazy." It would be easy to be cynical about a German-French startup named The Exploration Company, which aims to build an increasingly.....»»
Amazon pours another $4B into Anthropic, OpenAI’s biggest rival
Amazon has now committed $8 billion to AI startup that makes a key ChatGPT competitor. On Friday, Anthropic announced that Amazon has increased its investment in the AI startup by.....»»
A former Orion engineer has surprisingly credible plans to fly European astronauts
"I know it's super hard, and I know it was crazy." It would be easy to be cynical about a German-French startup named The Exploration Company, which aims to build an increasingly.....»»
Southeast Asia coastline research highlights the pressures human activities place on tropical marine ecosystems
The tropical coastlines of Southeast Asia are home to some of the most important and biodiverse marine ecosystems on the planet. However, they are also among its most vulnerable, with areas of coral reefs, mangrove forests and seagrass beds under inc.....»»
Lenovo introduces ThinkShield Firmware Assurance
Lenovo introduced ThinkShield Firmware Assurance as part of its portfolio of enterprise-grade cybersecurity solutions. ThinkShield Firmware Assurance is one of the only computer OEM solutions to enable deep visibility and protection below the operati.....»»
Full recovery from breaches takes longer than expected
In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated timeline of 5.9 months, according to Fastly. Cybersecurity leaders feel unprepa.....»»
Quantum DXi9200 helps organizations manage and reduce cybersecurity risks
Quantum announces the DXi9200, the latest generation of its flagship DXi9000 Series hybrid (flash + dense disk) data protection appliances, designed for scalable, efficient backup and recovery services for large organizations. With the continuing thr.....»»
Astronauts found to process some tasks slower in space, but no signs of permanent cognitive decline
A stay in space exerts extreme pressures on the human body. Astronauts' bodies and brains are impacted by radiation, altered gravity, challenging working conditions, and sleep loss—all of which could compromise cognitive functioning. At the same ti.....»»
Cybersecurity jobs available right now: November 20, 2024
Application Security Engineer ENOC | UAE | On-site – View job details As an Application Security Engineer, you will establish and maintain DLP policies to prevent unauthorized access, transmission, or disclosure of sensitive data, foc.....»»
Perplexity takes aim at Google and Amazon with new shopping tool
With Google and Amazon in its sights, AI startup Perplexity has launched a shopping tool that lets you search for and purchase items within the app......»»
Dev + Sec: A collaborative approach to cybersecurity
The age-old tension between development and security teams has long been a source of friction in organizations. Developers prioritize speed and efficiency, aiming to deliver features and products quickly with a fast-paced, iterative development cycle.....»»
This open-source alternative to ChatGPT just got serious
French AI startup Mistral just rolled out a half dozen new features, a model update (and an entirely new model) in its bid to compete with the likes of OpenAI.....»»
ScubaGear: Open-source tool to assess Microsoft 365 configurations for security gaps
ScubaGear is an open-source tool the Cybersecurity and Infrastructure Security Agency (CISA) created to automatically evaluate Microsoft 365 (M365) configurations for potential security gaps. ScubaGear analyzes an organization’s M365 tenant configu.....»»
Cybercriminals hijack DNS to build stealth attack networks
Hijacking domains using a ‘Sitting Ducks attack’ remains an underrecognized topic in the cybersecurity community. Few threat researchers are familiar with this attack vector, and knowledge is scarce. However, the prevalence of these attacks and t.....»»
Using AI to drive cybersecurity risk scoring systems
In this Help Net Security video, Venkat Gopalakrishnan, Principal Data Science Manager at Microsoft, discusses the development of AI-driven risk scoring models tailored for cybersecurity threats, and how AI is revolutionizing risk assessment and mana.....»»
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the atta.....»»
How cybersecurity failures are draining business budgets
Security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps, according to Panaseer. The.....»»
Zero-days dominate top frequently exploited vulnerabilities
A joint report by leading cybersecurity agencies from the U.S., UK, Canada, Australia, and New Zealand has identified the most commonly exploited vulnerabilities of 2023. Zero-day vulnerabilities on the rise The advisory highlights that malicious cyb.....»»