Taiwan steps up efforts for V2X security
With the rising trend of V2X, the Taiwan Telematics Industry Association (TTIA) has founded a team to set the information and communication criteria that matches international standards, as well as monitor information security issues......»»
Venafi helps organizations solve more machine identity security problems
Venafi introduced new product capabilities in its Control Plane for Machine Identities. This latest version of the Venafi Control Plane will enable security and platform teams to address the most critical machine identity security challenges and help.....»»
Harmonic Security raises $17.5 million to improve data security for organizations
Harmonic Security has secured $17.5 million in Series A funding to bring its “zero-touch data protection” capabilities to enterprises. Total funding has now reached more than $26 million since the company launched in October last year with enterp.....»»
T-Mobile pays $16 million fine for three years’ worth of data breaches
Breaches in three consecutive years lead to $16M fine and new security protocols. T-Mobile has agreed to pay a $15.75 million fine and improve its security in a settlement over a.....»»
OpenAI unveils easy voice assistant creation at 2024 developer event
Altman steps back from the keynote limelight and lets four major API additions do the talking. On Monday, OpenAI kicked off its annual DevDay event in San Francisco, unveiling fou.....»»
Taiwan shuts down as Typhoon Krathon approaches
Taiwan shut down schools and closed its financial markets on Wednesday as Typhoon Krathon pounded its south and east with torrential rains and winds ahead of its expected landfall......»»
Catalogic DPX 4.11 strengthens data security
Catalogic Software announced the newest version of Catalogic DPX, the company’s enterprise data protection software. DPX 4.11 provides enhanced capabilities in data recovery and data security. With this new release, Catalogic DPX continues to incre.....»»
SAFE X equips CISOs with integrated data from all their existing cybersecurity products
Safe Security launched SAFE X, a generative AI-powered mobile app for CISOs. SAFE X delivers CISOs real-time business impact insights into their cybersecurity posture, enabling better decision-making and risk prioritization. CISOs often invest millio.....»»
Suricata: Open-source network analysis and threat detection
Suricata is an open-source network intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring engine. Suricata features Suricata offers comprehensive capabilities for network security monitoring (NSM), includ.....»»
Enhancing firewall management with automation tools
In this Help Net Security interview, Raymond Brancato, CEO at Tufin, discusses the considerations organizations must weigh when selecting a next-generation firewall to effectively balance security needs with network performance. What factors should o.....»»
Research highlights global plant diversity "darkspots" where scientific efforts are urgently needed
An ambitious project led by scientists from the Royal Botanic Gardens, Kew, along with global partners, seeks to shed light on the planet's "plant diversity darkspots"—regions teeming with biodiversity but where geographic and taxonomic data remain.....»»
T-Mobile pays $16 million fine for three years’ worth of data breaches
Breaches in three consecutive years lead to $16M fine and new security protocols. Enlarge (credit: Getty Images | SOPA Images ) T-Mobile has agreed to pay a $15.75 million fine and improve its security in a settlement ov.....»»
OpenAI unveils easy voice assistant creation at 2024 developer event
Altman steps back from the keynote limelight and lets four major API additions do the talking. Enlarge (credit: Benj Edwards) On Monday, OpenAI kicked off its annual DevDay event in San Francisco, unveiling four major AP.....»»
New report shows wildlife criminals in UK "getting away with it"
A new study led by an Anglia Ruskin University (ARU) expert has revealed alarming shortcomings in the UK's efforts to prosecute wildlife criminals......»»
Q&A: UN security council needs major changes—permanent seats for African countries is just one
Recently, the US ambassador to the United Nations announced America's support for the creation of two new permanent UN security council seats for African states. Gary Wilson, a scholar of international law and relations—specifically issues related.....»»
Q&A: Extreme weather is disrupting lives in southern Africa—new policies are needed to keep the peace
Over the past decades, heavy and more frequent rainfall and dry spells in southern Africa have caused loss and damage to agriculture, livestock, the energy sector, food security and nutrition......»»
Inadequate compensation for lost or downgraded protected areas threatens global biodiversity: Study
Conservation scientists at the National University of Singapore (NUS) have highlighted substantial gaps in the compensation for lost or downgraded protected areas. These gaps risk undermining global efforts for the protection of biodiversity and thre.....»»
Use Windows event logs for ransomware investigations, JPCERT/CC advises
The JPCERT Coordination Center – the first Computer Security Incident Response Team established in Japan – has compiled a list of entries in Windows event logs that could help enterprise defenders respond to human-operated ransomware atta.....»»
ConnectSecure unveils M365 Assessment Module to help MSPs identify security weaknesses
ConnectSecure launched its new Microsoft 365 (M365) Assessment module. The solution empowers MSPs with greater visibility into Microsoft 365 configurations, offering real-time monitoring of changes and improving security controls. As the most widely.....»»
Dragos acquires Network Perception to boost security in OT environments
Dragos announced the acquisition of Network Perception, makers of NP-View, a network visualization platform for OT networks. The acquisition will bolster the Dragos Platform with industry-leading OT network visibility along with compliance and segmen.....»»
RSA and Swissbit join forces to secure government agencies
RSA and Swissbit announced that RSA will start introducing its next-generation hardware authenticators RSA iShield Key 2 series powered by Swissbit alongside RSA ID Plus for Government. Built to meet the highest security standards, the RSA iShield Ke.....»»