Advertisements


The Metaverse Needs Standards, Too

When Meta (formerly Facebook) announced in October 2021 that it would be developing metaverse technologies, it prompted a flurry of speculation and attendant announcements from other companies. Beyond that, it triggered an avalanche of confusion aro.....»»

Category: topSource:  theglobeandmailSep 1st, 2022

NIST proposes barring some of the most nonsensical password rules

Proposed guidelines aim to inject badly needed common sense into password hygiene. Enlarge (credit: Getty Images) The National Institute of Standards and Technology (NIST), the federal body that sets technology standards.....»»

Category: topSource:  informationweekRelated NewsSep 26th, 2024

Paid open-source maintainers spend more time on security

Paid maintainers are 55% more likely to implement critical security and maintenance practices than unpaid maintainers and are dedicating more time to implementing security practices like those included in industry standards like the OpenSSF Scorecard.....»»

Category: securitySource:  netsecurityRelated NewsSep 23rd, 2024

New standards and better technology are improving wireless EV charging

The speed, power density and efficiency of wireless charging are increasing at the same time engineers are finding ways to reduce weight. New standards aim to ensure charging works regardless of vehicle brand or equipment manufacturer......»»

Category: topSource:  autonewsRelated NewsSep 18th, 2024

Apple A16 chips now being made in the US, creating a mystery

Apple A16 chips are now being made in TSMC’s US chipmaking plant in Arizona, according to a new report. It’s said that while yield rates are lower than those achieved in Taiwan, they are very close to hitting the same standards. The big myster.....»»

Category: gadgetSource:  9to5macRelated NewsSep 18th, 2024

Compliance frameworks and GenAI: The Wild West of security standards

In this Help Net Security interview, Kristian Kamber, CEO at SplxAI, discusses how security challenges for GenAI differ from traditional software. Unlike predictable software, GenAI introduces dynamic, evolving threats, requiring new strategies for d.....»»

Category: securitySource:  netsecurityRelated NewsSep 16th, 2024

Software glitch plagues more than 1.2 million Ram 1500s, triggers NHTSA recall

Problems with the electronic stability control system in 2019-24 model year Rams cause them to fail federal safety standards, increasing crash risks......»»

Category: topSource:  autonewsRelated NewsSep 9th, 2024

New AI standards group wants to make data scraping opt-in

The Dataset Providers Alliance wants to make AI data licensing ethical. Enlarge / They know... (credit: Aurich / Getty) The first wave of major generative AI tools largely were trained on “publicly available” data—.....»»

Category: topSource:  arstechnicaRelated NewsSep 5th, 2024

OpenBAS: Open-source breach and attack simulation platform

OpenBAS is an open-source platform that enables organizations to plan, schedule, and execute crisis exercises, adversary simulations, and breach simulations. Compliant with ISO 22398 standards, OpenBAS is built as a modern web application featuring a.....»»

Category: securitySource:  netsecurityRelated NewsSep 4th, 2024

First fuel spill clean-up targets identified for Macquarie Island

Australian scientists have developed the first environmental standards for fuel contamination in soils, for sub-Antarctic environments......»»

Category: topSource:  physorgRelated NewsAug 30th, 2024

New Sisyphus cooling technique could enhance precision of atomic clocks

Researchers in the Neutral Atom Optical Clocks Group at the National Institute of Standards and Technology (NIST), University of Colorado and Pennsylvania State University recently devised a new sub-recoil Sisyphus cooling technique that could help t.....»»

Category: topSource:  marketingvoxRelated NewsAug 29th, 2024

RSA Authenticator App improves cybersecurity for federal agencies

RSA announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo 8 to improve th.....»»

Category: securitySource:  netsecurityRelated NewsAug 27th, 2024

Self-driving industry could soon flourish, but roadblocks still remain

Fifteen years into the modern-day push to develop self-driving vehicles, standards and best practices are still under development, regulations are fuzzy and incomplete, and safety benchmarks don't exist......»»

Category: topSource:  autonewsRelated NewsAug 21st, 2024

LLMs are unsuited for meeting the standards of Platonic epistemology in education, researchers find

Researchers from the University of Adelaide advise that more caution should be exercised for the use of generative artificial intelligence (AI) in educational contexts. This comes after a new study highlights key differences between modern technology.....»»

Category: topSource:  pcmagRelated NewsAug 21st, 2024

OpenCTI: Open-source cyber threat intelligence platform

OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence (CTI) data and observables. The platform structures its data using a knowledge schema built on the STIX2 standards. It features a modern web appl.....»»

Category: securitySource:  netsecurityRelated NewsAug 21st, 2024

NIST releases finalized post-quantum encryption standards

NIST has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer. The announced algorithms are specified in the first completed standards from NIST’s post-quantum cryptography (PQC) standardiz.....»»

Category: securitySource:  netsecurityRelated NewsAug 14th, 2024

NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?

The Network and Information Security (NIS) 2 Directive is possibly one of the most significant pieces of cybersecurity regulation to ever hit Europe. The 27 EU Member States have until 17 October 2024 to adopt and publish the standards necessary to c.....»»

Category: securitySource:  netsecurityRelated NewsAug 9th, 2024

How to use built-in network security features for Mac, iPhone, and iPad

Apple devices use many common internet security standards. Here's what each of them does, and how to use them on your Mac, iPhone, or iPad.Using Apple's network security features.In the networked world we live in, internet connectivity is ubiquitous......»»

Category: appleSource:  appleinsiderRelated NewsAug 8th, 2024

New hemp standards for research and industry

Hemp (Cannabis sativa L.) research and commercial production has recently experienced a global revival motivated by passage of laws reversing long-standing prohibitions and by development in markets......»»

Category: topSource:  physorgRelated NewsAug 8th, 2024

How to use built-in network security features for Apple devices

Apple devices use many common internet security standards. Here's what each of them does, and how to use them on your Apple hardware.Using Apple's network security features.In the networked world we live in, internet connectivity is ubiquitous.Keepin.....»»

Category: appleSource:  appleinsiderRelated NewsAug 8th, 2024

Apple files motion to dismiss DOJ antitrust lawsuit, citing harm to innovation and user experience

Apple has officially filed a motion to dismiss the Department of Justice’s antitrust lawsuit filed in May. Apple argues the case should be dismissed because the DOJ’s lawsuit does not meet the legal standards required to prove a violation of Sect.....»»

Category: topSource:  theglobeandmailRelated NewsAug 3rd, 2024