The new weakest link in the cybersecurity chain
It used to be that people were the greatest cybersecurity vulnerability, but this is no longer true. The rise of the internet made people more connected than ever. Attackers capitalized on that fact and targeted employees directly to gain access to a.....»»
RISCPoint RADAR provides real-time vulnerability detection across multiple attack surfaces
RISCPoint Advisory Group launched RADAR, an all-in-one cybersecurity platform. Combining continuous threat discovery with expert-led Penetration Testing as a Service (PTaaS), RADAR represents a significant leap forward in proactive security and risk.....»»
So, how’s CrowdStrike doing?
CrowdStrike, the cybersecurity firm at the center of a huge global IT outage in July, has revealed some of the impact that the incident has had on its business......»»
Third-party risk management is under the spotlight
In the aftermath of the CrowdStrike IT outage, new research has uncovered a critical vulnerability within financial institutions regarding supply chain resilience. The outage has demonstrated the need for greater digital supply chain resilience, part.....»»
The NIS2 Directive: How far does it reach?
The NIS2 Directive is one of the most recent efforts of the EU legislator to boost cybersecurity across the bloc and to keep up with the challenges of an increasingly digitalized society and growing cyber threats. As the name implies, the NIS2 Direct.....»»
Ancient sea cow that was attacked by both a primeval crocodile and shark sheds new light on prehistoric food chains
A new study showing how a prehistoric sea cow was preyed upon by not one, but two different carnivores—a crocodilian and a shark—is revealing clues into both the predation tactics of ancient creatures and the wider food chain millions of years ag.....»»
Pioneer Kitten: Iranian hackers partnering with ransomware affiliates
A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomwar.....»»
Diligent NIS2 Compliance Toolkit helps organizations bolster their cybersecurity resilience
Diligent launched its Network and Information Security Directive (NIS2) Compliance Toolkit, designed to help organizations navigate the complexities of the European Union (EU) NIS2 Directive and bolster their cybersecurity resilience. The toolkit map.....»»
Veeam Data Platform 12.2 extends data resilience to more platforms and applications
Veeam Software released Veeam Data Platform v12.2, broadening support for protecting data on an extensive range of new platforms while continuing to advance end-to-end cybersecurity capabilities. This latest release combines the most comprehensive da.....»»
Most food waste happens at home—new research reveals the best ways to reduce it
The EU and UK pledged to reduce food waste, in line with the UN's goal to halve global food waste by 2030. With most (approximately 53%) of total food waste in European countries occurring in homes, this stage of the food chain presents the most sign.....»»
M4 MacBook Pro update looms as supply chain continues to ramp up
The supply chain is continuing to ramp up new Mac production, with another report indicating M4 Pro and Max MacBook Pro upgrades are being prepared for a fall release.MacBook Pro could get M4 chips this fallApple's supply chain is hard at work assemb.....»»
Dragos Platform updates streamline OT threat and vulnerability workflows
Dragos announced the latest release of the Dragos Platform, an OT network visibility and cybersecurity platform. The updates provide industrial and critical infrastructure organizations with even deeper and enriched visibility into all assets in thei.....»»
Cybersecurity jobs available right now: August 28, 2024
Business Information Security Officer Toyota North America | USA | On-site – View job details Acting as an Information Security ambassador to the business, this role works with technology, data, risk, business, and the larger TFS Info.....»»
RSA Authenticator App improves cybersecurity for federal agencies
RSA announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo 8 to improve th.....»»
After cybersecurity lab wouldn’t use AV software, US accuses Georgia Tech of fraud
Researchers allegedly found security protocols "burdensome." Enlarge (credit: Georgia Tech) Dr. Emmanouil "Manos" Antonakakis runs a Georgia Tech cybersecurity lab and has attracted millions of dollars in the last few ye.....»»
Apple thinks two-thirds of iPhone 16 sales will be Pro models, says supply-chain report
Component orders placed by Apple suggest the company thinks two-thirds of iPhone 16 sales will be one of the two Pro models, according to a new supply-chain report. The clue is that the periscope lens currently exclusive to the iPhone 15 Pro Max i.....»»
Apple shifts iPhone 16 production mix to greatly favor Pro models
The iPhone 16 Pro Max will be the most-produced model in the 2024 release slate, according to a report into supply chain component shipments.Cameras on an iPhone 16 Pro mock-upThe Pro models of iPhone are already the most popular option among consume.....»»
Google avoids “link tax” bill with deal to fund California journalism and AI
Critics say Google got off easy as it agrees to pay $55 million into news fund. Enlarge (credit: Getty Images | Josh Edelson) Google has agreed to fund local journalism and an artificial intelligence initiative in Califo.....»»
GenAI models are easily compromised
95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manip.....»»
Why C-suite leaders are prime cyber targets
Senior executives are prime targets for cybercriminals, with 72% of surveyed cybersecurity professionals in the US reporting that cyberattacks have targeted this group in the past 18 months. This trend, highlighted in GetApp’s 2024 Executive Cybers.....»»
Chick-fil-A plans to launch streaming service with original shows
Fast-food chain is paying up to $400K for unscripted content, Deadline reports. Enlarge / Would you like a streaming subscription with that? (credit: Getty) Look out, Peacock. There's reportedly a new video streaming se.....»»