Resecurity Focusing on Supply Chain Cybersecurity to Protect Enterprises
LOS ANGELES–(BUSINESS WIRE)– #cyber–Resecurity has introduced a new feature to evaluate third-party risk and accelerate digital risk management operations following President Biden’s EO. The post Resecurity Focusing on Supply Cha.....»»
Data Theorem Code Secure helps security and DevOps teams secure their software
Data Theorem launched Code Secure, the latest evolution in application security designed to protect the software supply chain from code to deployment. Code Secure uniquely integrates Static Application Security Testing (SAST), Software Composition An.....»»
Australia moves to expand Antarctic marine park
Australia moved Tuesday to protect a swathe of ocean territory by expanding an Antarctic marine park that is home to penguins, seals, whales and the country's only two active volcanos......»»
UN biodiversity summit in Colombia aims to turn words into action
Two years after a landmark UN-brokered deal to protect nature from a massive wave of destruction, delegates will gather at a new COP in Colombia in late October to assess their progress......»»
Column: Port strike, Hurricane Helene test the auto industry"s supply chain resiliency
The auto industry avoided worst-case scenarios with the port strike's end, but the impacts of Hurricane Helene will stick around......»»
Helene ravaged the NC plant that makes 60% of the country’s IV fluid supply
There is currently no timeline for when the plant will be able to reopen. Hurricane Helene's catastrophic damage and flooding to the Southeastern states may affect the country's m.....»»
Port strike"s end averts potential calamity for auto supply chain
The end of the port strike that shut down shipping on the East and Gulf coasts after three days comes as a relief to the auto industry, which had feared supply bottlenecks that could last months......»»
Best practices for implementing threat exposure management, reducing cyber risk exposure
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional vulnerability management evolves, TEM addresses the overwhelming risks arising.....»»
Stellantis hybrid sales in Europe constrained by transmission supply, Carlos Tavares says
The ramp-up of a dual-clutch transmission at factories in Italy and France is holding back sales of models with Stellantis' new 48-volt hybrid powetrain, which can cut emissions by up to 25 percent, CEO Carlos Tavares said......»»
OpenAI secures $6.6 billion in latest funding round
Thanks to $6.6 billion in funding from the likes of Microsoft and Nvidia with a $157 billion valuation, OpenAI is now one of the wealthiest private enterprises on the planet......»»
Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
CVE-2024-29824, an unauthenticated SQL Injection vulnerability in Ivanti Endpoint Manager (EPM) appliances, is being exploited by attackers, the Cybersecurity and Infrastructure Security Agency has confirmed by adding the bug to its Known Exploited V.....»»
To really be greener, businesses need to look to the boardroom
Greenwashing scandals—the practice of misleading the public about what action a company or organization is taking to protect the environment—are on the rise. As the climate crisis intensifies, greenwashing represents a significant obstacle to mee.....»»
Whitepaper: Reach higher in your career with cloud security
The cybersecurity skills gap presents ongoing challenges worldwide, so organizations are scrambling to fill cloud security positions. Having a subject matter expert on staff qualified to advise on cloud security requirements is more important now tha.....»»
Ransomware activity shows no signs of slowing down
Ransomware attacks have seen a significant resurgence, disrupting multiple sectors and affecting global supply chains. Despite efforts to disrupt major ransomware groups, incidents continue to rise, signaling an ongoing and growing threat into 2024......»»
EEOC sues Stellantis dealership over sex discrimination allegations
Benson Enterprises' Ingram Park Chrysler-Jeep-Dodge-Jeep in San Antonio, allegedly subjected two female employees to unfair treatment and fired one in retaliation......»»
Hurricane Helene shuts down North Carolina facilities crucial for microchip production
Facilities in North Carolina operated by two companies that mine a crucial mineral needed for semiconductor production remain down because of the impacts of Hurricane Helene, raising worries about potential long-term effects on microchip supply......»»
Filament structure found to activate and regulate CRISPR-Cas "protein scissors"
CRISPR-Cas systems help to protect bacteria from viruses. Several different types of CRISPR-Cas defense systems are found in bacteria, which differ in their composition and functions. Among them, the most studied proteins today are Cas9 and Cas12, al.....»»
Ukraine Is Decentralizing Energy Production to Protect Itself From Russia
The Energy Act for Ukraine Foundation is equipping schools and hospitals with solar panels and energy storage systems to nullify Russian attacks on the country's power plants......»»
Hurricane Helene Will Send Shockwaves Through the Semiconductor Industry
Downpours at Spruce Pine, North Carolina, have taken the biggest known deposit of high-purity quartz offline, leaving the global tech supply chain potentially starved of an ingredient vital for making microchips......»»
PlexTrac unveils new capabilities to prioritize proactive security remediation
PlexTrac announced significant enhancements to its platform. These updates are designed to help enterprises and security service providers harness proactive security by offering business context, automating risk scoring to focus on what matters most,.....»»
Ring Protect rebrands to Ring Home and adds 24/7 recording
Ring Protect is now Ring Home, and while its pricing structure is the same, it benefits from several cool new features -- including 24/7 recording......»»