Resecurity partners with CFBD to mitigate risk for Peruvian enterprises
Resecurity partners with CFBD to expand Resecurity’s AI-driven cybersecurity solutions and services to Peru. As Peru’s digital economy expands, cyber threats are increasingly prominent, with 32% of organizations in Peru suffering cyber-at.....»»
Canadian insurers and municipalities sharing data could improve availability, affordability of flood insurance
The increasing cost of flood damage has seen property insurance become less affordable for many Canadians. New research from the University of Waterloo shows that if insurers and local governments pooled information on investment in flood-risk manage.....»»
McGovern Automotive"s deal to buy Mercedes store isn"t just business — it"s personal
Sellers Allan Sockol and Scott Coleman's values align with rapidly growing McGovern, and they will remain involved in the dealership as partners......»»
Expel partners with Wiz to enhance security for cloud environments
Expel announced a new strategic partnership with Wiz, a cloud-native application protection platform (CNAPP). The partnership provides an integration offering MDR for Wiz toxic risk combinations (including vulnerabilities, secrets, malware, and threa.....»»
Cybersecurity jobs available right now: August 28, 2024
Business Information Security Officer Toyota North America | USA | On-site – View job details Acting as an Information Security ambassador to the business, this role works with technology, data, risk, business, and the larger TFS Info.....»»
Rare whale species observed during recent Antarctic expedition
Research by Wageningen Marine Research and partners on the relationship between sea ice and the Southern Ocean food web investigates various components of that food web, including the so-called "top predators," or seabirds and marine mammals. To map.....»»
AI modeling can deliver more benefits, less risk for water partnerships
A Cornell-led research collaboration found that cooperative partnerships seeking to spread the cost burden of water infrastructure projects among regional stakeholders often end up forcing local partners to bear the brunt of underlying supply and fin.....»»
Half of enterprises suffer breaches despite heavy security investments
Data breaches have become an increasingly severe threat, with recent reports highlighting a surge in their frequency and cost. Understanding the latest trends and statistics surrounding data breaches is essential for developing effective strategies t.....»»
Study IDs best "red flags" auditors can use to spot financial fraud
A new analysis of the benchmarks that auditors use to identify financial statement fraud risk finds that the most commonly used benchmarks are less effective at identifying fraud than benchmarks that are less commonly used......»»
Hotel room key cards everywhere could be at risk from RFID security flaw
Security researchers find flawed contactless cards dating back to late 2007, and urge users to be careful......»»
Drawbridge expands cyber risk assessment service
Drawbridge released its next generation cyber risk assessment service. Provided as a suite of modules, the solution combines a set of analytics with Drawbridge’s client service. Clients can now benchmark and score their cyber programs to prioritize.....»»
Vulnerability prioritization is only the beginning
To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the shape of some risk-ranking structure displayed in a table with links out to the CVEs and other advisory or threa.....»»
Portugal seeks EU help as wildfire threatens UNESCO-listed forest
Portugal on Wednesday appealed to EU partners for assistance in fighting a wildfire on the Atlantic island of Madeira that has raged for a week and threatened a UNESCO-listed forest......»»
AI exhibits racial bias in mortgage underwriting decisions, researchers find
Putting AI to use in mortgage lending decisions could lead to discrimination against Black applicants, according to new research. But researchers say there may be a surprisingly simple solution to mitigate this potential bias......»»
Study calls for locally inclusive public health adaptation strategies to climate change
Modern disaster risk reduction strategies must incorporate Indigenous knowledge and local cultural practices to be adoptable and sustainable, according to a descriptive phenomenological study carried out in Kenya by researchers from the University of.....»»
Deplatforming puts sex workers at risk, study says
A study published in Social Sciences by CUNY SPH alumna Melissa Ditmore and team suggests that laws criminalizing sex work don't prevent human trafficking and leave sex workers vulnerable to coercion and unsafe conditions......»»
HITRUST unveils AI Risk Management Assessment solution
HITRUST launched its AI Risk Management (AI RM) Assessment, a comprehensive assessment approach for AI risk management processes in an organization. The HITRUST AI Risk Management Assessment ensures that governance associated with implementing AI sol.....»»
New software tool aims to reduce reliance on animal testing
In recent years, machine learning models have become increasingly popular for risk assessment of chemical compounds. However, they are often considered "black boxes" due to their lack of transparency, leading to skepticism among toxicologists and reg.....»»
Organizations turn to biometrics to counter deepfakes
The risk of deepfakes is rising with 47% of organizations having encountered a deepfake and 70% of them believing deepfake attacks which are created using generative AI tools, will have a high impact on their organizations, according to iProov. Perce.....»»
Group-IB partners with SecurityHQ to enhance SOC capabilities
Group-IB announced the signing of a global partnership agreement with SecurityHQ, a global independent Managed Security Service Provider (MSSP). With this partnership, SecurityHQ will leverage Group-IB’s Threat Intelligence, Attack Surface Mana.....»»
To improve your cybersecurity posture, focus on the data
Effectively converging, managing and using enterprise data is a huge undertaking. Enterprises have vast hoards of data, but those hoards exist within siloed systems and applications, and it requires a lot of manual effort by highly skilled data scien.....»»