SecureAuth protects sensitive information with biometric continuous identity assurance
SecureAuth is releasing biometric continuous identity assurance (BCIA). This ability is designed to safeguard a company’s sensitive information for the duration of a user’s session — providing additional protection from emerging threats.....»»
AI’s impact on the future of web application security
In this Help Net Security interview, Tony Perez, CEO at NOC.org, discusses the role of continuous monitoring for real-time threat detection, the unique risks posed by APIs, and strategies for securing web applications. Perez also addresses how AI-dri.....»»
What 2025 holds for user identity protection
In this Help Net Security video, David Cottingham, President of rf IDEAS, discusses what he sees as the most prominent areas for improvement and continued change in the space: As we move into 2025, it’s evident that businesses recognize MFA as esse.....»»
Wearable tech for space station research
Many of us wear devices that count our steps, measure our heart rate, track sleep patterns, and more. This information can help us make healthy decisions—research shows the devices encourage people to move more, for example—and could flag possibl.....»»
Bectran adds RSA encryption to protect the transmission of sensitive data
Keeping information secure is both a leading challenge and priority among B2B credit, collections and accounts receivables departments. It requires vigilance against scams like identity theft and hacks that intercept vital business and customer infor.....»»
High-performance inkjet print head enhances bioprinting productivity
Bioprinting is a technology used to create three-dimensional structures, such as human tissues or organs, using bio-inks made of cells and hydrogels. However, conventional inkjet technology has difficulty dispensing bio-inks that are sensitive to tem.....»»
Study links abortion access to women"s economic outcomes
Access to safe, legal abortion can be a lifelong economic stratifier, according to a new analysis of a national database of adolescent health information......»»
An even more tempting Galaxy flip phone may be coming next year
A less expensive Galaxy Z Flip phone could arrive in the new year. Here's the latest information on what this phone could include......»»
Evaluating your organization’s application risk management journey
In this Help Net Security interview, Chris Wysopal, Chief Security Evangelist at Veracode, discusses strategies for CISOs to quantify application risk in financial terms. Wysopal outlines the need for continuous risk management practices and robust s.....»»
The changing face of identity security
It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold o.....»»
Powerpipe: Open-source dashboards for DevOps
Powerpipe is an open-source solution designed to streamline DevOps management with powerful visualization and compliance tools, making it simple to track, assess, and act on key data for smarter decision-making and continuous compliance monitoring. D.....»»
Stalker 2 preload guide: release date, file size, and preorder
Pull on your gas masks and watch your Geiger counters because Stalker 2 preload information is coming in hot. Here's what you need to know before it arrives......»»
Research shows gender, nationality enhance rivalry perceptions
When a competitor and opponent have a common identity that's relevant to a particular competition, it will increase their perception of rivalry and inspire them to try harder, according to new Cornell University research......»»
Understanding causes of echo chambers: Political news selective exposure across countries
In our digital age, with easy access to a vast array of information, one would think that readers would naturally be exposed to a wide range of perspectives. However, the opposite seems to be happening, especially in countries like the United States.....»»
Is Final Fantasy 14 cross-platform?
The hit MMORPG Final Fantasy 14 is available on all major platforms now, but are they connected? Here's all the cross-platform information you need to know......»»
Researchers warn against misusing lack of climate change adaptation measurements to cut funding
The UN Climate Change Conference (COP29) in Baku (Azerbaijan) from November 11 to 22, 2024, will also address the sensitive issue of financing adaptation strategies. Prof. Dr. Lisa Schipper from the Department of Geographical Development Research at.....»»
Law enforcement operation takes down 22,000 malicious IP addresses worldwide
Operation Synergia II took aim at phishing, ransomware, and information stealing. An international coalition of police agencies has taken a major whack at criminals accused of run.....»»
Industrial companies in Europe targeted with GuLoader
A recent spear-phishing campaign targeting industrial and engineering companies in Europe was aimed at saddling victims with the popular GuLoader downloader and, ultimately, a remote access trojan that would permit attackers to steal information from.....»»
Australians who think inequality is high have less faith in democratic institutions, according to study
Central to Australia's cultural and political identity is the notion of a "fair go." But recent elections, including in the United States, have highlighted the challenge of maintaining shared norms and support for institutions when many voters don't.....»»
North Korean hackers employ new tactics to compromise crypto-related businesses
North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware. The crypto-related phishing campaign Since July 2024, phishing emails seemingly containing helpful information on risks related to the.....»»
AWS security essentials for managing compliance, data protection, and threat detection
AWS offers a comprehensive suite of security tools to help organizations manage compliance, protect sensitive data, and detect threats within their environments. From AWS Security Hub and Amazon GuardDuty to Amazon Macie and AWS Config, each tool is.....»»