Why women struggle in the cybersecurity industry
The workplace experiences of women in cybersecurity are dramatically worse than men across virtually every category, according to a WiCyS and Aleria survey. Previous studies have illustrated that the representation of women in cybersecurity is much l.....»»
Apple poaches AI experts from Google, creates secretive European AI lab
At least 36 former Googlers now work on AI for Apple. Enlarge / Apple has been tight-lipped about its AI plans but industry insiders suggest the company is focused on deploying generative AI on its mobile devices. (credit: FT mo.....»»
eBook: Do you have what it takes to lead in cybersecurity?
Organizations worldwide need talented, experienced, and knowledgeable cybersecurity teams who understand the advantages and risks of emerging technologies. Aspiring leaders in the cybersecurity field need more than just job experience. They need a di.....»»
Security analysts believe more than half of tasks could be automated
Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. AI expected to boost threat detection In fact, security analysts maintain that up t.....»»
Women should be included in decisions on the protection of human rights in the climate crisis, say researchers
Eighty percent of climatic migrants are women and children. This figure means that a new international legal framework is required to protect human rights by adding gender-sensitive measures to policies and legislation. This is the claim made by Susa.....»»
Most kids are only coached by men in junior sport—women also need to be part of the picture, say researchers
Ask your son or daughter, niece, or nephew to draw you a picture of a sport coach. They will most probably draw a man. Why?.....»»
Weak passwords for smart home devices to be illegal in Europe
Default passwords for smart home devices and wireless routers will have to be made stronger in order to comply with new cybersecurity laws in both the UK and EU … more….....»»
Researchers unveil novel attack methods targeting Intel’s conditional branch predictor
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. The multi-university and industry resea.....»»
Silobreaker empowers users with timely insight into key cybersecurity incident filings
Silobreaker announced the addition of automatic collection, AI-enhanced analysis, and alerting on 8-K cybersecurity incident filings made to the US Securities and Exchange Commission (SEC). This enhancement to the Silobreaker platform empowers organi.....»»
UK enacts IoT cybersecurity law
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop using guessable default passwords and have a vulnerability disclosure poli.....»»
Apple"s iPhone factory shift has left a ghost town behind in China
Foxconn is closing factories in China as iPhone production moves elsewhere, and impacts beyond industry have been made crystal clear in a new video.A Foxconn facility signApple has long operated its production in China, but in recent years it has bee.....»»
Standardized power management could extend EV battery range
The automotive industry is being pushed to establish a standard to manage the power flow to electronic control units that govern different parts of the vehicle depending on the context......»»
5 stars of the 2024 Beijing auto show
Nearly every domestic and international brand attended the showcase event of the Chinese auto industry. Here are the hits (and a few misses) from the show, which featured more than 100 premieres......»»
Anticipating and addressing cybersecurity challenges
In this Help Net Security round-up, we present excerpts from previously recorded videos in which security experts talk about how increased adoption of cloud technology, remote work, and the proliferation of IoT devices present significant challenges.....»»
Closing the cybersecurity skills gap with upskilling programs
The list of skills technologists and organizations need to succeed grows with each new tech advancement, according to Pluralsight. But for many organizations, budgets and staff continue to shrink. This survey asked 1,400 executives and IT professiona.....»»
Scientists discover safer alternative for an explosive reaction used for more than 100 years
The chemical industry has been using a reaction with explosive chemicals for more than 100 years—now Mülheim scientists have discovered a safer alternative. The Ritter Group of the Max Planck Institut für Kohlenforschung in Mülheim/Ruhr has publ.....»»
5 defining moments from Tesla"s Q1 earnings
Industry analysts expected bad news from Tesla's first-quarter earnings report after weak sales. But CEO Elon Musk provided an upbeat narrative by announcing new affordable models for next year......»»
Breaking down the numbers: Cybersecurity funding activity recap
Here’s a list of interesting cybersecurity companies that received funding so far in 2024. Aim Security January | $10 million Aim Security raised $10 million in seed funding, led by YL Ventures, with participation from CCL (Cyber Club Lond.....»»
Former Apple researchers launch startup focused on protecting iOS devices
Two former Apple employees who worked for the company as cybersecurity researchers are now launching their own startup. Called DoubleYou, the startup is focused on helping creators of cybersecurity products protect iOS devices and Macs. more….....»»
Can an online library of classic video games ever be legal?
Preservationists propose access limits, but industry worries about a free "online arcade." Enlarge / The Q*Bert's so bright, I gotta wear shades. (credit: Aurich Lawson | Getty Images | Gottlieb) For years now, video gam.....»»
Three women contract HIV from dirty “vampire facials” at unlicensed spa
Five patients with links to the spa had viral genetic sequences that closely matched. Enlarge / Drops of the blood going onto an HIV quick test. (credit: Getty | BRITTA PEDERSEN) Trendy, unproven "vampire facials" perfor.....»»