Strengthening critical infrastructure cybersecurity is a balancing act
In this Help Net Security interview, Aaron Crow, Senior Director at MorganFranklin Consulting, discusses critical infrastructure cybersecurity strategies, barriers to threat information sharing, and innovative technologies enhancing resilience agains.....»»
Boeing faces critical launch ferrying astronauts to the International Space Station
Ferrying astronauts to the International Space Station has almost become routine—but not for Boeing and not on Monday, when after years of delay it's finally set to launch two crew members to the orbiting platform on a critical test flight......»»
Are carbon-capture models effective?
Reforestation efforts to restock depleted forests are important for addressing climate change and for both capturing and restoring carbon from the Earth's atmosphere. These types of solutions to mitigate carbon emissions are critical after 2023 prove.....»»
NASA’s Orion spacecraft has ‘critical issues’ with its heat shield, report finds
NASA intends to use its Orion capsule to send astronauts to the moon, but a report has found that issues with the capsule's heat shield could be a safety risk......»»
What can AI learn about the universe?
Artificial intelligence and machine learning have become ubiquitous, with applications ranging from data analysis, cybersecurity, pharmaceutical development, music composition, and artistic renderings......»»
Final U.S. rules extend timetable for critical mineral sourcing in EV tax credit eligibility
The rule expands the timetable for graphite sourcing until 2027, a critical mineral used in battery production that is overwhelmingly produced in China......»»
Cyble Vision X covers the entire breach lifecycle
Cyble is launching Cyble Vision X, the successor to its Cyble Vision 2.0 threat intelligence platform, to elevate the user experience by empowering decision-makers with immediate access to critical information. The comprehensive release infuses artif.....»»
BlackBerry CylanceMDR improves cybersecurity defensive strategy
BlackBerry introduced the new and expanded CylanceMDR, offering comprehensive Managed Detection & Response (MDR) protection powered by the Cylance AI platform and augmented with award-winning security operations center analysts for 24×7 threat c.....»»
What is cybersecurity mesh architecture (CSMA)?
Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA approach means designing a security architecture that is composable and scalable with easily extensible interfaces,.....»»
Most companies changed their cybersecurity strategy in the past year
Businesses worldwide have faced a rate of change in the threat environment evidenced by 95% of companies reporting cybersecurity strategy adjustments within just the past year, according to LogRhythm. Strategic shifts within organizations At the hear.....»»
Trend Micro expands AI-powered cybersecurity platform
Trend Micro launched significant additional AI-powered functionality in its platform to secure organizational use of AI and better manage the risks associated with mass adoption of new AI tools. “Great advancements in technology always come wit.....»»
Snyk AppRisk Pro leverages AI and third-party integrations for faster risk mitigation
Snyk has released Snyk AppRisk Pro, pairing artificial intelligence (AI) with application context from third-party integrations to help application security (AppSec) and development teams address business-critical risk and accelerate fixes. Snyk AppR.....»»
Deep Instinct DIANNA provides malware analysis for unknown threats
Deep Instinct announced the launch of Deep Instinct’s Artificial Neural Network Assistant (DIANNA), an AI-based cybersecurity companion that provides explainability into unknown threats. DIANNA enhances Deep Instinct’s prevention-first approa.....»»
Dropbox says attackers accessed customer and MFA info, API keys
File hosting service Dropbox has confirmed that attackers have breached the Dropbox Sign production environment and accessed customer personal and authentication information. “From a technical perspective, Dropbox Sign’s infrastructure is lar.....»»
Women rising in cybersecurity roles, but roadblocks remain
The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several significant findings. These include promising trends in women’s entry into the profession, their roles wit.....»»
New computer algorithm supercharges climate models and could lead to better predictions of future climate change
Earth System Models—complex computer models that describe Earth processes and how they interact—are critical for predicting future climate change. By simulating the response of our land, oceans and atmosphere to manmade greenhouse gas emissions,.....»»
Q&A: Jobs for young Africans—new data tool reveals trends and red flags
An estimated 23.6 million young Africans (aged 15–35) are unemployed—that's one in 22 (4.5%). With this number projected to grow to 27 million by 2030, the need for jobs is critical. But the key to good policies for job creation is good data......»»
Essential steps for zero-trust strategy implementation
63% of organizations worldwide have fully or partially implemented a zero-trust strategy, according to Gartner. For 78% of organizations implementing a zero-trust strategy, this investment represents less than 25% of the overall cybersecurity budget......»»
Cybersecurity jobs available right now: May 1, 2024
Adversary Simulation Specialist LyondellBasell | Poland | On-site – View job details The Adversary Simulation Specialist will be responsible for testing and evaluating the security of a LyondellBasell’s networks, systems, and applic.....»»
Making cybersecurity more appealing to women, closing the skills gap
In this Help Net Security interview, Charly Davis, CCO at Sapphire, provides insights into the current challenges and barriers women face in the cybersecurity industry. Davis emphasizes the need for proactive strategies to attract diverse talent, imp.....»»
Carvana"s plans to return to growth sought ahead of Q1 earnings
How the company executes its next growth period is critical, Carvana CEO Ernie Garcia said......»»