Prioritizing CIS Controls for effective cybersecurity across organizations
In this Help Net Security interview, Randy Marchany, CISO at Virginia Tech, discusses the challenges and strategies associated with implementing CIS Controls in organizations of varying sizes. Marchany explores the importance of securing top-level ma.....»»
DNA-based methods found highly effective for identifying insect species
A team of researchers from Linnaeus University and Linköping University, extensively evaluated DNA barcoding and metabarcoding methods. A comprehensive study has demonstrated that DNA-based methods are remarkably reliable for identifying insect spec.....»»
Support for carbon pricing higher than expected, finds study
Viewed by many experts as one of the most effective tools of climate policy, carbon pricing seeks to reduce carbon dioxide emissions. Currently, however, only 23% of global greenhouse gas emissions are subject to this climate tax, as it is seen as un.....»»
Nature-based solutions are cheap and effective, and governments have the tools to make them a reality
As the world gathers in Azerbaijan for this year's annual UN climate conference (COP29), the urgency to act on climate change has never been greater......»»
Charity campaigns are using outdated representations of Africa, says new paper
In a new paper, Dr. Edward Ademolu and Jess Crombie from University of the Arts London investigate the ethical complexities of international non-government organizations (INGO) representations. The research focuses specifically on how visual storytel.....»»
Deep Instinct delivers malware and ransomware prevention for cloud data stored in S3 buckets
Deep Instinct launched Deep Instinct DSX for Cloud Amazon S3. As organizations increasingly rely on the cloud to power their digital transformation, businesses are generating and storing record amounts of data in the cloud. Cybercriminals know this a.....»»
Lenovo introduces ThinkShield Firmware Assurance
Lenovo introduced ThinkShield Firmware Assurance as part of its portfolio of enterprise-grade cybersecurity solutions. ThinkShield Firmware Assurance is one of the only computer OEM solutions to enable deep visibility and protection below the operati.....»»
Full recovery from breaches takes longer than expected
In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated timeline of 5.9 months, according to Fastly. Cybersecurity leaders feel unprepa.....»»
Iron-clad defense: How microbes shield tomato crops from bacterial wilt
Ralstonia solanacearum is a soil-borne pathogen that devastates tomato and other Solanaceae crops globally. Traditional chemical controls have proven inadequate and environmentally damaging......»»
Decontaminating toxic tires: Researchers show ability to remove toxic particles from end-of-life tires
Tires are an indispensable part of daily life. Without them, our vehicles would just be a bunch of assembled parts—convenient to sit in, but not effective for getting where you are going......»»
Light-based technology is safe and effective for mitigating fungal contamination of cereal grains, study finds
Fungal contamination of cereal grains poses a substantial threat to food security and public health while causing hundreds of millions of dollars in economic losses annually. In a new study, researchers at the University of Illinois Urbana-Champaign.....»»
Investment in support services effective in increasing diversity, retention of apprentices in highway construction
New research from Portland State University demonstrates that a substantial initiative from the Oregon Bureau of Labor and Industries (BOLI) and Oregon Department of Transportation (ODOT) is an effective tool for improving the recruitment and retenti.....»»
New study emphasizes value of a carbon tax to effectively decarbonize the economy
A carbon tax is the most effective way for New Zealand to cut emissions while supporting a stable economy, according to a University of Auckland study......»»
Quantum DXi9200 helps organizations manage and reduce cybersecurity risks
Quantum announces the DXi9200, the latest generation of its flagship DXi9000 Series hybrid (flash + dense disk) data protection appliances, designed for scalable, efficient backup and recovery services for large organizations. With the continuing thr.....»»
Yubico Enrollment Suite boosts security for Microsoft users
Yubico announced Yubico Enrollment Suite for Microsoft users, including Yubico FIDO Pre-reg and the new YubiEnroll. These solutions integrate with Microsoft’s Entra ID, helping organizations create stronger cyber resilience and provide support to f.....»»
Exabeam and Wiz join forces to improve cloud security
Exabeam coolaborates with with Wiz to provide organizations with improved threat detection, investigation, and response (TDIR) capabilities, ensuring a more secure and resilient cloud environment. With its open architecture the Exabeam New-Scale Secu.....»»
Cybersecurity jobs available right now: November 20, 2024
Application Security Engineer ENOC | UAE | On-site – View job details As an Application Security Engineer, you will establish and maintain DLP policies to prevent unauthorized access, transmission, or disclosure of sensitive data, foc.....»»
Splunk simplifies infrastructure requirements for Microsoft Azure customers
Splunk announced its enterprise security, observability and platform offerings on Microsoft Azure. In partnering with Microsoft, Splunk empowers organizations to scale their digital transformation on Azure with unified solutions that accelerate innov.....»»
Onapsis Secure RISE Accelerator streamlines security elements of modern SAP deployments
Onapsis announced the Onapsis Secure RISE Accelerator, helping organizations execute their RISE with SAP transformation with confidence. The new offering reduces security and compliance obstacles with a structured, bundled solution that simplifies an.....»»
Tanium delivers autonomous controls that mitigate risk and maintain operational resiliency
Tanium unveiled new AI-powered autonomous innovations that transform how IT and Security teams execute change safely and reliably in their IT environments – at scale and in real-time. Tanium Autonomous Endpoint Management (AEM) enhances and extends.....»»
How can brands address growing consumer skepticism?
Transparency and effective communication are critical for brands to gain and keep consumer trust according to new research......»»