Tenable enhances ExposureAI capabilities to directly query AI engine and reduce risk
Tenable has unveiled enhancements to ExposureAI, the generative AI capabilities and services within its Tenable One Exposure Management Platform. The new features enable customers to quickly summarize relevant attack paths, ask questions of an AI ass.....»»
White Sands propulsion team tests 3D-printed Orion engine component
When the Orion spacecraft carries the first Artemis crews to the moon and back, it will rely on the European Service Module contributed by ESA (European Space Agency) to make the journey. The service module provides electrical power generation, propu.....»»
Solid-state reaction among multiphase multicomponent ceramic enhances ablation performance, study finds
Multicomponent ultra-high temperature ceramic (UHTC) has attracted much attention in research due to its superior high-temperature mechanical properties, lower thermal conductivity and enhanced oxidation resistance......»»
Mitsubishi eyes U.S. market EV from Nissan as North America takes center stage
Mitsubishi CEO Takao Kato books record operating income and says North America has swapped places with Southeast Asia to become its earnings engine......»»
Study informs climate resilience strategies in urban, rural areas
Local decision-makers looking for ways to reduce the impact of heat waves on their communities have a valuable new capability at their disposal: a new study on vegetation resilience......»»
Bentley unwraps V-8 hybrid powertrain
Bentley's shift away from its iconic W-12 engine will not result in a loss of power......»»
In Tesla Autopilot probe, U.S. prosecutors focus on securities, wire fraud
U.S. prosecutors are examining whether Tesla committed securities or wire fraud by misleading investors and consumers about its electric vehicles’ self-driving capabilities, three people familiar with the matter told Reuters.  .....»»
Mongolia"s wildlife at risk from overgrazing
The icy peaks of Jargalant Mountain are supposed to belong to snow leopards, whose numbers have dwindled to fewer than 1,000 in Mongolia, but hard-pressed herders are increasingly pushing into the vulnerable animals' traditional habitat......»»
Research team develops AI to perform chemical synthesis
Chemistry, with its intricate processes and vast potential for innovation, has always been a challenge for automation. Traditional computational tools, despite their advanced capabilities, often remain underutilized due to their complexity and the sp.....»»
Cloudflare for Unified Risk Posture identifies cyber threats
Cloudflare announced Cloudflare for Unified Risk Posture, a new suite of risk management solutions designed to streamline the process of identifying, evaluating, and managing cyber threats that pose risk to an organization, across all environments. P.....»»
Traceable launches Generative AI API Security to combat AI integration risks
Traceable AI has revealed an Early Access Program for its new Generative AI API Security capabilities. As enterprises increasingly integrate Generative AI such as Large Language Models (LLMs) into critical applications, they expose those applications.....»»
Eclypsium offers protection for GenAI hardware infrastructure
Eclypsium announced new GenAI assessment capabilities for its Supply Chain Security Platform. The new capabilities help secure the fundamental layers of the GenAI tech stack through support for NVIDIA hardware and popular GenAI foundation models. As.....»»
The complexities of third-party risk management
In this Help Net Security video, Brad Hibbert, Chief Strategy Officer and Chief Operating Officer for Prevalent, discusses five interesting findings from a recent industry study on third-party risk management and what he thinks they mean for cybersec.....»»
The "Let Loose" event was the first to be edited on iPad using Final Cut Pro
For the first time, Apple has used the iPad to edit some of the footage of one of its Apple Events to showcase the powerful capabilities of its tablet lineup.Shot on iPhone, edited on iPadOn Tuesday, Apple held its 'Let Loose' event, which largely se.....»»
Non-governmental organizations raise concerns about child abuse reporting
Community organizations making child welfare reports to Oranga Tamariki say it's not uncommon to be met with delayed decisions or silence, even on high-risk cases, a new Otago study has found......»»
Dynatrace enhances its platform with new Kubernetes Security Posture Management capabilities
Dynatrace is enhancing its platform with new Kubernetes Security Posture Management (KSPM) capabilities for observability-driven security, configuration, and compliance monitoring. This announcement follows the rapid integration of Runecast technolog.....»»
BigID introduces dual-scanning capabilities for cloud native workloads
BigID has introduced a new advancement in cloud data security, privacy, and governance with the launch of its dual-scanning technology. BigID’s dual, or “hybrid”, scanning technology gives organizations speed, efficiency, and flexib.....»»
Contradictory thoughts lead to more moderate attitudes, psychologists find
Researchers from the Leibniz Institute for Psychology (ZPID) and the University of Hohenheim present rhetorical tools that can help to reduce the polarization of discussions......»»
Datadog Event Management helps teams reduce alert fatigue
Datadog released IT Event Management to its suite of AIOps capabilities. With Event Management, Datadog intelligently consolidates, correlates and enriches all alert events and important signals from Datadog and existing third-party observability too.....»»
Arctic Wolf Cyber Resilience Assessment helps organizations advance business resilience
Arctic Wolf released the Arctic Wolf Cyber Resilience Assessment, a risk assessment tool designed to help businesses of almost any size advance their cyber resilience and improve insurability by effectively mapping their security posture against indu.....»»
Code42 unveils source code exfiltration detection and protection capabilities
Code42 has advanced its Incydr data protection product with new capabilities to see and stop source code leak and theft and ensure organizations can prevent potential breaches, without burdening developers or security analysts. Source code is the mos.....»»