Advertisements


Rethinking cyber risk: The case against spreadsheets

In this Help Net Security video, Christina Hoefer, VP of Global Industrial Enterprise at Forescout, discusses why it is time for manufacturers/OT security leaders to “toss the spreadsheet” regarding their traditional methods of tracking data for.....»»

Category: securitySource:  netsecurityNov 10th, 2023

The NIS2 Directive: How far does it reach?

The NIS2 Directive is one of the most recent efforts of the EU legislator to boost cybersecurity across the bloc and to keep up with the challenges of an increasingly digitalized society and growing cyber threats. As the name implies, the NIS2 Direct.....»»

Category: securitySource:  netsecurityRelated NewsAug 29th, 2024

South Korea court to rule on embryo plaintiff climate case

A groundbreaking climate case brought against the South Korean government by young environmental activists who named an embryo as a lead plaintiff is set to be decided Thursday by the country's Constitutional Court......»»

Category: topSource:  theglobeandmailRelated NewsAug 29th, 2024

Canadian insurers and municipalities sharing data could improve availability, affordability of flood insurance

The increasing cost of flood damage has seen property insurance become less affordable for many Canadians. New research from the University of Waterloo shows that if insurers and local governments pooled information on investment in flood-risk manage.....»»

Category: topSource:  physorgRelated NewsAug 28th, 2024

Pioneer Kitten: Iranian hackers partnering with ransomware affiliates

A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»

Category: securitySource:  netsecurityRelated NewsAug 28th, 2024

Expel partners with Wiz to enhance security for cloud environments

Expel announced a new strategic partnership with Wiz, a cloud-native application protection platform (CNAPP). The partnership provides an integration offering MDR for Wiz toxic risk combinations (including vulnerabilities, secrets, malware, and threa.....»»

Category: securitySource:  netsecurityRelated NewsAug 28th, 2024

Cybersecurity jobs available right now: August 28, 2024

Business Information Security Officer Toyota North America | USA | On-site – View job details Acting as an Information Security ambassador to the business, this role works with technology, data, risk, business, and the larger TFS Info.....»»

Category: securitySource:  netsecurityRelated NewsAug 28th, 2024

AI modeling can deliver more benefits, less risk for water partnerships

A Cornell-led research collaboration found that cooperative partnerships seeking to spread the cost burden of water infrastructure projects among regional stakeholders often end up forcing local partners to bear the brunt of underlying supply and fin.....»»

Category: topSource:  pcmagRelated NewsAug 27th, 2024

Study IDs best "red flags" auditors can use to spot financial fraud

A new analysis of the benchmarks that auditors use to identify financial statement fraud risk finds that the most commonly used benchmarks are less effective at identifying fraud than benchmarks that are less commonly used......»»

Category: topSource:  theglobeandmailRelated NewsAug 26th, 2024

Judge upholds $350,000 award against Michigan dealership for wrongful repossession

A federal judge upheld a $350,000 punitive damages award against a Michigan dealership in a spot delivery and wrongful repossession case......»»

Category: topSource:  autonewsRelated NewsAug 24th, 2024

Hotel room key cards everywhere could be at risk from RFID security flaw

Security researchers find flawed contactless cards dating back to late 2007, and urge users to be careful......»»

Category: topSource:  marketingvoxRelated NewsAug 23rd, 2024

Drawbridge expands cyber risk assessment service

Drawbridge released its next generation cyber risk assessment service. Provided as a suite of modules, the solution combines a set of analytics with Drawbridge’s client service. Clients can now benchmark and score their cyber programs to prioritize.....»»

Category: securitySource:  netsecurityRelated NewsAug 23rd, 2024

Vulnerability prioritization is only the beginning

To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the shape of some risk-ranking structure displayed in a table with links out to the CVEs and other advisory or threa.....»»

Category: securitySource:  netsecurityRelated NewsAug 23rd, 2024

FDA green-lights fall COVID-19 boosters

Updated mRNA vaccines from Pfizer and Moderna are ready to roll. Enlarge (credit: Getty Images) As the COVID-19 case count continues to tick upward, the US Food and Drug Administration has approved an updated vaccine for.....»»

Category: topSource:  arstechnicaRelated NewsAug 23rd, 2024

New videos detail Apple’s latest features for Final Cut Pro and Camera

Apple has released a pair of new videos today on its YouTube channel. Both focus on the recent additions to its Final Cut Pro and Final Cut Camera apps. Each video walks through the new features and makes the case for users to use Final Cut as their.....»»

Category: topSource:  theglobeandmailRelated NewsAug 22nd, 2024

AirTags are now being used as bait to catch package thieves

AirTag owners continue to find new and valuable ways to use Apple’s tracking device. It’s become commonplace to add AirTags to luggage when traveling. But now, there’s a new use case emerging that may yet prove popular: bait for catching packag.....»»

Category: topSource:  marketingvoxRelated NewsAug 22nd, 2024

Why C-suite leaders are prime cyber targets

Senior executives are prime targets for cybercriminals, with 72% of surveyed cybersecurity professionals in the US reporting that cyberattacks have targeted this group in the past 18 months. This trend, highlighted in GetApp’s 2024 Executive Cybers.....»»

Category: securitySource:  netsecurityRelated NewsAug 22nd, 2024

Google can’t defend shady Chrome data hoarding as “browser agnostic,” court says

Court reverses Google win in case from Chrome users who chose not to sync data. Enlarge (credit: Thomas Trutschel / Contributor | Photothek) Chrome users who declined to sync their Google accounts with their browsing dat.....»»

Category: topSource:  arstechnicaRelated NewsAug 21st, 2024

Study calls for locally inclusive public health adaptation strategies to climate change

Modern disaster risk reduction strategies must incorporate Indigenous knowledge and local cultural practices to be adoptable and sustainable, according to a descriptive phenomenological study carried out in Kenya by researchers from the University of.....»»

Category: topSource:  pcmagRelated NewsAug 21st, 2024

Deplatforming puts sex workers at risk, study says

A study published in Social Sciences by CUNY SPH alumna Melissa Ditmore and team suggests that laws criminalizing sex work don't prevent human trafficking and leave sex workers vulnerable to coercion and unsafe conditions......»»

Category: topSource:  pcmagRelated NewsAug 21st, 2024

UK antitrust investigation into Apple closed for now – but will likely re-open

A UK antitrust investigation into Apple has officially closed – despite finding the company to be at fault – after the regulator missed a legal deadline. However, a case seems almost certain to be re-opened under an upcoming law which will gra.....»»

Category: topSource:  marketingvoxRelated NewsAug 21st, 2024