Advertisements


The dangers of unsupported applications

Are ageing technologies and infrastructure threatening the security and productivity of your business? A recent investigation by the National Audit Office (NAO – UK’s independent public spending watchdog) revealed that the Department for Envi.....»»

Category: securitySource:  netsecurityFeb 10th, 2023

Bioengineers and chemists design fluorescent 3D-printed structures with potential medical applications

In a process as simple as stirring eggs and flour into pancakes, University of Oregon researchers have mixed fluorescent ring-shaped molecules into a novel 3D printing process. The result: intricate glowing structures that support the development of.....»»

Category: topSource:  physorgRelated NewsSep 27th, 2024

Research team succeeds in ultra-fast switching of tiny light sources

Extremely thin materials consisting of just a few atomic layers promise applications for electronics and quantum technologies. An international team led by TU Dresden has now made remarkable progress with an experiment conducted at Helmholtz-Zentrum.....»»

Category: topSource:  physorgRelated NewsSep 27th, 2024

New MIT protocol protects sensitive data during cloud-based computation

Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often require powerful cloud-based servers. This dependency on cloud computing rai.....»»

Category: securitySource:  netsecurityRelated NewsSep 26th, 2024

Cloudflare helps secure popular messaging applications

Cloudflare announced a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. When using end-to-end encryption messaging applications, a public-private key exchange encrypts messages to prot.....»»

Category: securitySource:  netsecurityRelated NewsSep 24th, 2024

Google calls for halting use of WHOIS for TLS domain verifications

WHOIS data is unreliable. So why is it used in TLS certificate applications? Enlarge (credit: Getty Images) Certificate authorities and browser makers are planning to end the use of WHOIS data verifying domain ownership.....»»

Category: topSource:  arstechnicaRelated NewsSep 20th, 2024

Researchers build AI model database to find new alloys for nuclear fusion facilities

A study led by the Department of Energy's Oak Ridge National Laboratory details how artificial intelligence researchers have created an AI model to help identify new alloys used as shielding for housing fusion applications components in a nuclear fus.....»»

Category: topSource:  physorgRelated NewsSep 20th, 2024

Microplastics: Meant to last, just not forever and not in our bodies

Megan Hill is an assistant professor of chemistry and leader of the Hill Lab in Colorado State University's College of Natural Sciences. Her research leverages organic chemistry to design advanced polymeric materials for applications in sustainabilit.....»»

Category: topSource:  marketingvoxRelated NewsSep 19th, 2024

PlainID introduces identity security for Zscaler

PlainID announces the PlainID Authorizer for Zscaler, available via PlainID SaaS Authorization Management, centralizes policy management for Zscaler and SaaS applications and tools. Zscaler and other SASE (Secure Access Service Edge) solutions have m.....»»

Category: securitySource:  netsecurityRelated NewsSep 18th, 2024

Freshwater oysters could be key to developing stronger, "greener" adhesives

If you think oysters are just delicious seafood, think again. Freshwater oysters produce an adhesive that may hold the secret to developing more environmentally friendly glues with applications from dental care to construction and shipping. An intern.....»»

Category: topSource:  physorgRelated NewsSep 17th, 2024

Zirconium metals under extreme conditions found to deform in surprisingly complex ways

Materials are crucial to modern technology, especially those used in extreme environments like nuclear energy systems and military applications. These materials need to withstand intense pressure, temperature and corrosion. Understanding their lattic.....»»

Category: topSource:  physorgRelated NewsSep 17th, 2024

Spacewalk an "emotional experience" for private astronauts

The commander of the daring space voyage that included the first-ever spacewalk by private astronauts described opening the hatch into the void as an "emotional experience" that left him in awe, yet deeply aware of the dangers......»»

Category: topSource:  physorgRelated NewsSep 17th, 2024

Trends and dangers in open-source software dependencies

A C-suite perspective on potential vulnerabilities within open-source dependencies or software packages reveals that, while remediation costs for dependency risks are perilously high, function-level reachability analysis still offers the best value i.....»»

Category: securitySource:  netsecurityRelated NewsSep 16th, 2024

New infosec products of the week: September 13, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Druva, Huntress, Ketch, LOKKER, Tenable, Trellix, and Wing Security. Tenable AI Aware provides exposure insight into AI applications, libraries and plugins T.....»»

Category: securitySource:  netsecurityRelated NewsSep 13th, 2024

Researchers solve long-standing mystery of alumina surface structure

Aluminum oxide (Al2O3), also known as alumina, corundum, sapphire, or ruby, is one of the best insulators used in a wide range of applications: in electronic components, as a support material for catalysts, or as a chemically resistant ceramic, to na.....»»

Category: topSource:  physorgRelated NewsSep 12th, 2024

Smartphone-based microscope rapidly reconstructs 3D holograms

Researchers have developed a new smartphone-based digital holographic microscope that enables precision 3D measurements. The highly portable and inexpensive microscope could help bring 3D measurement capabilities to a broader range of applications, i.....»»

Category: topSource:  physorgRelated NewsSep 11th, 2024

Tenable AI Aware provides exposure insight into AI applications, libraries and plugins

Tenable released AI Aware, advanced detection capabilities designed to surface artificial intelligence solutions, vulnerabilities and weaknesses available in Tenable Vulnerability Management. Tenable AI Aware provides exposure insight into AI applica.....»»

Category: securitySource:  netsecurityRelated NewsSep 11th, 2024

Chemical chameleon reveals novel pathway for separating rare-earth metals

Researchers at the Department of Energy's Oak Ridge National Laboratory have found a chemical "chameleon" that could improve the process used to purify rare-earth metals used in clean energy, medical and national security applications......»»

Category: topSource:  theglobeandmailRelated NewsSep 9th, 2024

Scalable, multi-functional device lays groundwork for advanced quantum applications

Researchers have demonstrated a new multi-functional device that could help advance the scalability of solid-state color centers, enabling them to be used in larger and more complex quantum computers and networks. As efficient photon-spin interfaces,.....»»

Category: topSource:  theglobeandmailRelated NewsSep 9th, 2024

Red Hat Enterprise Linux AI extends innovation across the hybrid cloud

Red Hat Enterprise Linux (RHEL) AI is Red Hat’s foundation model platform, enabling users to develop, test, and run GenAI models to power enterprise applications. The platform brings together the open source-licensed Granite LLM family and Instruct.....»»

Category: securitySource:  netsecurityRelated NewsSep 9th, 2024

OpenZiti: Secure, open-source networking for your applications

OpenZiti is a free, open-source project that embeds zero-trust networking principles directly into applications. Example of an OpenZiti overlay network OpenZiti features “We created OpenZiti to transform how people think about connectivity. Whi.....»»

Category: securitySource:  netsecurityRelated NewsSep 9th, 2024