vCISO Directory helps SMBs manage their cybersecurity
The industry’s first-ever directory of virtual CISO (vCISO) service providers has gone live. This list of vCISO providers means that SMBs can tap the expertise of qualified cybersecurity professionals to protect their digital assets and ensure comp.....»»
A closer look at the 2023-2030 Australian Cyber Security Strategy
In this Help Net Security video, David Cottingham, CEO of Airlock Digital, discusses the 2023-2030 Australian Cyber Security Strategy and reviews joint and individual cybersecurity efforts, progress, and strategies over the past year. The Australian.....»»
AWS security essentials for managing compliance, data protection, and threat detection
AWS offers a comprehensive suite of security tools to help organizations manage compliance, protect sensitive data, and detect threats within their environments. From AWS Security Hub and Amazon GuardDuty to Amazon Macie and AWS Config, each tool is.....»»
Addigy simplifies compliance for Apple devices with one-click CMMC and DISA STIG benchmarks
For managed service providers (MSPs) and IT administrators working with the Department of Defense or its contractors, staying compliant with cybersecurity rules isn’t just important—it’s essential. Yet, ensuring compliance with standards like t.....»»
Authlete 3.0 empowers organizations to improve how they issue and manage user credentials
Authlete launched Authlete 3.0, offering support for OpenID for Verifiable Credential Issuance (OID4VCI). This new capability empowers organizations—including governments, financial institutions, and educational establishments—to revolutionize ho.....»»
The cybersecurity gender gap: How diverse teams improve threat response
In this Help Net Security interview, Julie Madhusoodanan, Head of CyberSecurity at LinkedIn, discusses how closing the gender gap could enhance cybersecurity’s effectiveness in combating emerging threats. With women still underrepresented in cybers.....»»
Key cybersecurity predictions for 2025
In this Help Net Security video, Chris Gibson, CEO at FIRST, discusses the evolving threat landscape and provides a unique take on where data breaches and cyber attacks will be in 2025. The post Key cybersecurity predictions for 2025 appeared first o.....»»
Testing thousands of RNA enzymes helps find first "twister ribozyme" in mammals
The "RNA world" hypothesis proposes that the earliest life on Earth may have been based on RNA—a single-stranded molecule similar in many ways to DNA—like some modern viruses. This is because, like DNA, RNA can carry genetic information, but, lik.....»»
How project governance helps navigate public-private "coopetition" tensions
The Ariane 6 project, Europe's new space launcher, is in the headlines as the European Space Agency (ESA) and ArianeGroup push for its first launch in 2024. This high-profile initiative has faced delays, but it remains a cornerstone of European ambit.....»»
Spraying rice with zinc oxide nanoparticles protects yields during heat waves, study finds
A small team of horticulturists in China and the U.S. has found that spraying rice plants with a zinc oxide nanoparticle solution helps them better handle the stress of a heat wave. In their study, published in Proceedings of the National Academy of.....»»
Lumifi acquires Critical Insight to boost incident response capabilities
Lumifi announces the acquisition of Critical Insight, marking its third acquisition in 13 months. This strategic move expands Lumifi’s service offerings and strengthens its presence in the healthcare and critical infrastructure cybersecurity se.....»»
Apple @ Work Podcast: Password security 101
Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & p.....»»
Cybersecurity jobs available right now: November 5, 2024
Application Security Engineer MassMutual | USA | Hybrid – View job details As an Application Security Engineer, you will conduct in-depth security assessments, including vulnerability scanning, and code reviews. Ensure secure coding p.....»»
New book explores the relationship between beauty and crisis
Creating and nurturing beauty in dark times helps us endure another day. Beauty can help us appraise how we live and how we can build better lives. Its presence or absence is a critique of the social and political structures that are necessary to all.....»»
IRISSCON 2024 to address AI’s dual impact on cybersecurity
The IRISSCERT Cyber Crime Conference (IRISSCON) returns on November 6th at the Aviva Stadium, where global cybersecurity leaders will explore AI’s revolutionary role in defending against and contributing to cyber threats. As Ireland’s longest-sta.....»»
Cybersecurity in crisis: Are we ready for what’s coming?
In this Help Net Security video, James Edgar, CISO at Corpay, reveals insights into cybersecurity health, concerns, challenges, and other considerations for building a solid defense program. Key insights revealed in Corpay’s 2024 State of Busin.....»»
Hiring guide: Key skills for cybersecurity researchers
In this Help Net Security interview, Rachel Barouch, an Organizational Coach for VCs and startups and a former VP HR in both a VC and a Cybersecurity startup, discusses the dynamics of cybersecurity researchers and team-building strategies. She highl.....»»
HP OmniBook Ultra 14 review: a solid entry for AMD
The HP OmniBook Ultra 14 helps introduce a new brand, and it leverages AMD's latest chipset for solid performance efficiency. But it's not the perfect laptop......»»
Apple @ Work: New FIDO specifications aim to end Passkey vendor lock-in
Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & p.....»»
Mathematical model decodes protein interactions to show how condensates form
Biological cells are incredibly complex mixes of proteins, nucleic acids, lipids and carbohydrates. A model developed by two RIKEN researchers helps explain why components of the same type sometimes do and sometimes don't spontaneously come together.....»»
Charcoal stored in preserved guano gives helps reconstruct regional fire histories
With wildfires growing more frequent and more intense in many parts of the world, scientists are looking to the past to better understand where and when fires have burned. Lakes and wetlands, which capture airborne charcoal particles when they fall f.....»»