Quake-prone Istanbul not at heightened risk: expert
Fears of another major earthquake have been rekindled in Istanbul since the February 6 disaster that hit Turkey and Syria, but a prominent Turkish seismologist has reassured the risk "hasn't increased"......»»
UK research reveals hand car wash sector is awash with exploitation
The risk of slavery in hand car washes across the UK has been exposed by new data from Nottingham Trent University (NTU) and modern slavery charity, The Clewer Initiative. It reveals a prevalence of indicators that make exploitation and slavery more.....»»
Study shows AI conversational agents can help reduce interethnic prejudice during online interactions
Prejudice and fear have always been at the core of intergroup hostilities. While intergroup interaction is a prerequisite for initiating peace and stability at the junction of clashing interests, values, and cultures, the risk of further escalation p.....»»
NHTSA probes 200,000 Ford Super Duty trucks for risk of fire
NHTSA said it received 27 complaints alleging diesel fuel leaks due to a "fracture in the secondary fuel filter housing." The proximity of the secondary fuel filter to high heat sources could result in fire, NHTSA said......»»
Security flaws in BIG-IP system could have put entire networks at risk
F5 released mitigations and a patch for two high-risk flaws......»»
Researchers: Heat is coming for our crops—we have to make them ready
Australia's vital agriculture sector will be hit hard by steadily rising global temperatures. Our climate is already prone to droughts and floods. Climate change is expected to supercharge this, causing sudden flash droughts, changing rainfall patter.....»»
Critical Start adds multiple frameworks to Risk Assessments
Critical Start announced the expansion of the frameworks available in its Risk Assessments offering. These additions to the tool expand upon the initial offering, providing additional framework-based assessments for customers to achieve data-driven e.....»»
BigID equips security teams with AI-guided data security and risk remediation recommendations
BigID announced the introduction of AI-guided data security and risk remediation recommendations. These new capabilities empower security teams to eliminate guesswork and more proactively address security risks to improve their overall security postu.....»»
AuditBoard enhances InfoSec Solutions to reduce compliance fatigue across the organization
AuditBoard announced powerful enhancements for its InfoSec Solutions to help organizations meet their IT compliance, cyber risk, and vendor risk management needs in the face of rising risks and increased regulatory requirements. With these new capabi.....»»
International SWOT mission can improve flood prediction
Rivers, lakes, and reservoirs are like our planet's arteries, carrying life-sustaining water in interconnected networks. When Earth's water cycle runs too fast, flooding can result, threatening lives and property. That risk is increasing as climate c.....»»
High hopes for carbon capture, underground storage
Capturing carbon dioxide (CO2) from the atmosphere to store underground "sounds too good to be true", a climate expert told AFP, yet the technology to increase its capacity tenfold is already being tested......»»
Ghost Security Phantasm detects attackers targeting APIs
Ghost Security announced the early access availability of Phantasm, application-specific threat intelligence poised to fill a large gap that currently exists in both threat intelligence and application security. Developed by a team of industry expert.....»»
Mongolia"s wildlife at risk from overgrazing
The icy peaks of Jargalant Mountain are supposed to belong to snow leopards, whose numbers have dwindled to fewer than 1,000 in Mongolia, but hard-pressed herders are increasingly pushing into the vulnerable animals' traditional habitat......»»
Cloudflare for Unified Risk Posture identifies cyber threats
Cloudflare announced Cloudflare for Unified Risk Posture, a new suite of risk management solutions designed to streamline the process of identifying, evaluating, and managing cyber threats that pose risk to an organization, across all environments. P.....»»
The complexities of third-party risk management
In this Help Net Security video, Brad Hibbert, Chief Strategy Officer and Chief Operating Officer for Prevalent, discusses five interesting findings from a recent industry study on third-party risk management and what he thinks they mean for cybersec.....»»
Non-governmental organizations raise concerns about child abuse reporting
Community organizations making child welfare reports to Oranga Tamariki say it's not uncommon to be met with delayed decisions or silence, even on high-risk cases, a new Otago study has found......»»
Arctic Wolf Cyber Resilience Assessment helps organizations advance business resilience
Arctic Wolf released the Arctic Wolf Cyber Resilience Assessment, a risk assessment tool designed to help businesses of almost any size advance their cyber resilience and improve insurability by effectively mapping their security posture against indu.....»»
What"s with the recent wild tornadoes? Expert weighs in
In the past week, weather authorities across the U.S. reported more than 100 tornadoes across the central and southern parts of the country, destroying dozens of homes and buildings from Oklahoma to Nebraska and Iowa......»»
"Everywhere we looked, we found evidence": Microplastics expert on 20 years of pollution research
Thirty years ago, while counting barnacles, limpets and seaweeds along rocky shores, I started noticing a daily tide of litter, mostly plastic. As a marine biology Ph.D. student at Liverpool University, I kept removing it, but the next day, there'd b.....»»
SaaS identity security strategies to prevent cyber risk in the workplace
SaaS identity security strategies to prevent cyber risk in the workplace.....»»
Splunk Asset and Risk Intelligence accelerates security investigations
Splunk announced Splunk Asset and Risk Intelligence, a solution designed to power the SOC of the future by helping businesses streamline compliance, reduce cyber risk and eliminate the sources of shadow IT. This new addition builds upon Splunk’s ro.....»»