Syxsense Zero Trust enables security teams to build access policies and remediation workflows
In Las Vegas, at Black Hat USA 2022, Syxsense announced Syxsense Zero Trust, a module within Syxsense Enterprise that enables endpoint compliance with Zero Trust Network Access policies (ZTNA). Zero Trust initiatives require focus on endpoint protect.....»»
ThreatX provides always-active API security from development to runtime
ThreatX has extended its Runtime API and Application Protection (RAAP) offering to provide always-active API security from development to runtime, spanning vulnerability detection at Dev phase to protection at SecOps phase of the software lifecycle......»»
UK outlaws awful default passwords on connected devices
The law aims to prevent global-scale botnet attacks. Enlarge (credit: Getty Images) If you build a gadget that connects to the Internet and sell it in the United Kingdom, you can no longer make the default password "pass.....»»
Critics question tech-heavy lineup of new Homeland Security AI safety board
CEO-heavy board to tackle elusive AI safety concept and apply it to US infrastructure. Enlarge (credit: Benj Edwards | Getty Images) On Friday, the US Department of Homeland Security announced the formation of an Artific.....»»
Microsoft finally kills this legacy Windows app — for good this time
Microsoft is swapping its legacy Skype for business communication platform for a new option in Teams......»»
Women should be included in decisions on the protection of human rights in the climate crisis, say researchers
Eighty percent of climatic migrants are women and children. This figure means that a new international legal framework is required to protect human rights by adding gender-sensitive measures to policies and legislation. This is the claim made by Susa.....»»
People put greater trust in news that leads them to be more politically extreme, says study
People not only think political news is likelier to be true if it reinforces their ideological biases, but will tend to trust news more if it leads them to adopt more extreme (and even incorrect) beliefs, finds a new study by a UCL researcher......»»
Better reservoir management could aid food security and fisheries conservation in US
After nearly a century of people building dams on most of the world's major rivers, artificial reservoirs now represent an immense freshwater footprint across the landscape. Yet, these reservoirs are understudied and overlooked for their fisheries pr.....»»
Customers say Meta’s ad-buying AI blows through budgets in a matter of hours
Based on your point of view, the AI either doesn't work or works too well. Enlarge / AI is here to terminate your bank account. (credit: Carolco Pictures) Give the AI access to your credit card, they said. It'll be fine.....»»
Mosyle launches Mosyle Fuse MSP to bring a single pane of glass approach to Apple managed service providers
Today, Mosyle has announced the launch of Mosyle Fuse MSP. This first solution integrates five critical management and security applications into a product specifically designed for Managed Service Providers (MSPs). Combining mobile device management.....»»
Okta warns customers about credential stuffing onslaught
Credential stuffing attacks have exploded this April, Okta warns, and advises its customers to use available tools to block access requests originating from residential proxies before authentication takes place. Abuse of proxy networks “In cred.....»»
UK enacts IoT cybersecurity law
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop using guessable default passwords and have a vulnerability disclosure poli.....»»
Roku (yes, Roku) make a home security camera, and it’s discounted today
The Roku Smart Home Indoor Security Camera is an inexpensive solution to your indoor security needs. It's on sale right now......»»
DHS establishes AI Safety and Security Board to protect critical infrastructure
The Department of Homeland Security announced the establishment of the Artificial Intelligence Safety and Security Board (the Board). The Board will advise the Secretary, the critical infrastructure community, other private sector stakeholders, and t.....»»
AI is creating a new generation of cyberattacks
Most businesses see offensive AI fast becoming a standard tool for cybercriminals, with 93% of security leaders expecting to face daily AI-driven attacks, according to Netacea. Offensive AI in cyberattacks The research, “Cyber security in the age o.....»»
How insider threats can cause serious security breaches
Insider threats are a prominent issue and can lead to serious security breaches. Just because someone is a colleague or employee does not grant inherent trust. In this Help Net Security video, Tara Lemieux, CMMC Consultant for Redspin, discusses insi.....»»
Prompt Fuzzer: Open-source tool for strengthening GenAI apps
Prompt Fuzzer is an open-source tool that evaluates the security of your GenAI application’s system prompt against dynamic LLM-based threats. Prompt Fuzzer features Simulation of over a dozen types of GenAI attacks The tool contextualizes itsel.....»»
Anticipating and addressing cybersecurity challenges
In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about how increased adoption of cloud technology, remote work, and the proliferation of IoT devices present significant challenges.....»»
Security Bite: Did Apple just declare war on Adload malware?
Following the release of new betas last week, Apple snuck out one of the most significant updates to XProtect I’ve ever seen. The macOS malware detection tool added 74 new Yara detection rules, all aimed at a single threat, Adload. So what is it ex.....»»
How to build your own GPT chatbot without coding
As a ChatGPT Plus subscriber, you’ll be able to use OpenAI’s advanced tools to build a custom chatbot all your own. Here’s how......»»
Huawei"s smart car tech offers Audi, other automakers route to China sales
Huawei's rapid emergence as a key auto supplier highlights the telecommunications equipment maker's drive for sources of growth after U.S. export controls pursued on national security grounds since 2019 hammered its businesses, especially smartphones.....»»