Qualys previews TotalCloud FlexScan for multicloud security management
Agentless security management system aims to simplify vulnerability management for security teams and developers in cloud and hybrid cloud environments......»»
The latest Windows update is breaking VPN connections
Microsoft has just confirmed that the April 2024 Windows security updates break VPN connections across client and server platforms......»»
Business and management graduates can become sustainability champions—lessons from Uganda and Tanzania
There is no doubt about it: the world is in the grips of a climate crisis. The headlines are full of reports about extreme weather events and the negative effects of the fossil fuel industry......»»
Kenya"s devastating floods expose decades of poor urban planning and bad land management
Floods in Kenya killed at least 169 people between March and April 2024. The most catastrophic of these deaths occurred after a flash flood swept through a rural village killing 42 people. Death and destruction have also occurred in the capital, Nair.....»»
Ring is launching its first integrated pan-tilt security camera later this year
The Ring Pan-Tilt Indoor Cam gives you 360-degree coverage of your home and carries a price tag of $80. It arrives on May 30, but preorders are now open......»»
Apple @ Work Podcast: Security and productivity in the age of AI
Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & p.....»»
Ring Pan-Tilt Indoor camera launches, with privacy blind
The first ever Ring Pan-Tilt Indoor camera has today been announced, offering a full 360 degrees of horizontal coverage, with 160 degrees of vertical tilt. The motorized base can be remotely controlled using the Ring app. The security camera comes.....»»
A closer look at Apiiro’s SHINE partner program
In this Help Net Security video, Adam LaGreca, Founder of 10KMedia, sat down with John Leon, VP of Partnerships at Apiiro, discusses the company’s new technology partner program SHINE. The name stands for the program’s guiding principles.....»»
Apple"s iOS 18 to streamline task management with unified events and reminders
Apple is testing improvements that will allow iPhone and Mac users to more intuitively manage their numerous Reminders and Calendar events with iOS 18 and macOS 15, AppleInsider has learned.Apple Calendar and Reminders get tighter integrations with m.....»»
Mass fish die-off in Vietnam as heat wave roasts Southeast Asia
Hundreds of thousands of fish have died in a reservoir in southern Vietnam's Dong Nai province, with locals and media reports suggesting a brutal heat wave and the lake's management are to blame......»»
Infosec products of the month: April 2024
Here’s a look at the most interesting products from the past month, featuring releases from: Akamai, Bitdefender, CyberInt, Fastly, Forcepoint, IDnow, Immuta, Index Engines, Invicti Security, LogRhythm, Netwrix, Owl Cyber Defense Solutions, Privace.....»»
Building a strong cloud security posture
In this Help Net Security video, David Kellerman, Field CTO at Cymulate, discusses how cloud security still seems to lag even as the cloud grows in popularity and usage. Many leaders are unaware that they need to secure the cloud the same way they wo.....»»
Cybersecurity jobs available right now: May 1, 2024
Adversary Simulation Specialist LyondellBasell | Poland | On-site – View job details The Adversary Simulation Specialist will be responsible for testing and evaluating the security of a LyondellBasell’s networks, systems, and applic.....»»
Making cybersecurity more appealing to women, closing the skills gap
In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women face in the cybersecurity industry. Davis emphasizes the need for proactive strategies to attract diverse talent, imp.....»»
Why cloud vulnerabilities need CVEs
When considering vulnerability management’s purpose in a modern world, it’s imperative to recognize the huge transition to new technologies and how you manage risk within these different paradigms and environments (e.g., the cloud). Patch net.....»»
Toyota names Jack Hollis, Chris Reynolds to new jobs under Ogawa
Toyota restructures its top North American management, splitting responsibilities between Jack Hollis and Chris Reynolds, with both reporting to CEO Ted Ogawa......»»
Using cow dung and microorganisms to compost diapers and sanitary wear
Research published in the International Journal of Environment and Waste Management has looked at how used diapers (baby nappies or adult napkins) and sanitary wear might be efficiently composted using cow dung—a readily available by-product of cat.....»»
Study explores biology, impact, management and potential distribution of destructive longhorn beetle
A new study published in the Journal of Pest Science explores the biology, impact, management and potential distribution of the invasive, red-necked longhorn beetle (Aromia bungii) which has recently invaded Japan, Germany, and Italy......»»
Cybersixgill Third-Party Intelligence module identifies potential supply chain risks
Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security team.....»»
Synopsys Polaris Assist automates repetitive, time-consuming tasks for security and development teams
Synopsys introduced Polaris Assist, an AI-powered application security assistant on the Synopsys Polaris Software Integrity Platform. Polaris Assist combines Large Language Model (LLM) technology with decades of Synopsys’ application security knowl.....»»
Onyxia launches AI-powered predictive insights to optimize security management
Onyxia Cyber unveiled OnyxAI to deliver insights that enable security leaders to proactively optimize security performance, resource allocation, and risk management. “We are seeing a real need in the market for security solutions that can simplify.....»»