RSA Authenticator App improves cybersecurity for federal agencies
RSA announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo 8 to improve th.....»»
Three Apple Watches get FDA approval for sleep apnea detection, from today
Three Apple Watches have received approval for detecting sleep apnea, just in time for today’s launch of the feature in watchOS 11. The Federal Drug Administration approval was able to be granted swiftly on the basis that the way Apple is doing.....»»
The ripple effects of regulatory actions on CISO reporting
In this Help Net Security video, Sara Behar, Content Manager at YL Ventures, discusses how recent regulatory actions and high-profile legal incidents involving cybersecurity leaders have influenced CISO reporting. In a recent report of the CISO Circu.....»»
Hackers claim 440GB of user data breached from large cybersecurity company
Hackers take 440GB of user data from one of the largest cybersecurity companies and post it to a hacking forum......»»
US sting of online gun part sales started with a shipment marked “fidget spinner”
US seizes 350 sites that masked gun part imports from China as toys, jewelry. Enlarge (credit: Dmitri Toms | iStock / Getty Images Plus) Federal authorities have seized more than 350 websites after an undercover investig.....»»
Neural network improves tunable diode laser absorption spectroscopy quantification accuracy
A research group from the Hefei Institutes of Physical Science (HFIPS) of the Chinese Academy of Sciences recently developed a neural network-based absorbance recovery method to improve the accuracy of single path tunable diode laser absorption spect.....»»
Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense
In this Help Net Security, Erica Banks, VP and a leader in Booz Allen’s civilian services business, discusses the Federal Cybersecurity Strategy’s role in safeguarding national assets. Banks outlines key areas for improvement, including funding,.....»»
Internal disconnects vs. cybersecurity: How connectivity shapes challenges
Concerns about the trustworthiness of internal data exist in nearly all organizations globally, according to TeamViewer. 99% of business leaders pointed to factors undermining trust in internal data, citing multiple versions of the truth (38%), confl.....»»
Benefits and best practices of leveraging AI for cybersecurity
AI has become a key player in protecting valuable organizational insights from threats. Thanks to AI-enabled data protection practices such as behavior monitoring, enterprises no longer have to be reactive to a cyberattack but can be proactive before.....»»
Minimum wage increases are important, but workers deserve more
This fall, several provinces across Canada are scheduled to increase their minimum wages. These provincial adjustments follow the federal government's decision to raise the federal minimum wage to $17.30 back in April......»»
Appeals court OKs NLRB"s continued enforcement action against Chicago Cadillac dealership
A federal appeals court has allowed the National Labor Relations Board to continue its enforcement action against a suburban Chicago dealership that engaged in unfair labor practices against unionized technicians......»»
Trellix strengthens email security with DLP capabilities
Trellix announced Trellix Email Security Cloud with integrated Trellix Data Loss Prevention (DLP) capabilities, available globally. The enhanced solution uniquely improves data security and protects organizations’ sensitive information by monitorin.....»»
Cybersecurity jobs available right now: September 11, 2024
ACISO HTX | Singapore | Hybrid – View job details As an ACISO, you will formulate Agency ICT security strategy and work plan, alignment to MHA and HTX’s IT & Cybersecurity strategic directions. Evaluate existing IT environment again.....»»
How AI and zero trust are transforming resilience strategies
In this Help Net Security interview, John Hernandez, President and General Manager at Quest Software, shares practical advice for enhancing cybersecurity resilience against advanced threats. He underscores the need to focus on on-premises and cloud e.....»»
Cybersecurity is a fundamental component of patient care and safety
Healthcare institutions are custodians of vast repositories of sensitive patient data, encompassing comprehensive health histories, insurance profiles, and billing data. The ramifications of a data breach often extend far beyond the immediate task of.....»»
SpaceX says regulators will keep Starship grounded until at least November
SpaceX blames the regulatory delay on "issues ranging from the frivolous to the patently absurd." Enlarge / Artist's illustration of catch arms ensnaring SpaceX's Super Heavy booster. (credit: SpaceX) The Federal Aviatio.....»»
Who is on SpaceX"s historic private spacewalk mission?
Four US civilians are set to attempt the first-ever private spacewalk on Thursday—a risky endeavor usually reserved for trained astronauts from government agencies......»»
High-throughput biosensor measures metabolite levels that indicate disease
Researchers at the Nano Life Science Institute (WPI-NanoLSI), Kanazawa University, have developed a biosensor that improves sensitivity to 1-methylnicotinamide (1-MNA) in urine by orders of magnitude without the need for sample purification. The work.....»»
CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)
The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-40766 – a recently fixed improper access control vulnerability affecting SonicWall’s firewalls – to its Known Exploited Vulnerabilities catalog, thus.....»»
Tufin improves security automation on Azure, GCP, and VMware clouds
Tufin Orchestration Suite (TOS) R24-2 ensures organizations’ network operations are efficient, secure, and always audit-ready by automating complex tasks, enhancing security visibility, and driving compliance. The key benefits TOS R24-2 deliver.....»»
33 open-source cybersecurity solutions you didn’t know you needed
Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security needs. These tools make cybersecurity accessible to a broader range of organizations and individual.....»»