WiCyS: A champion for a more diverse cybersecurity workforce
In this Help Net Security interview, Lynn Dohm, Executive Director at Women in CyberSecurity (WiCyS), talks about how the organization supports its members across different stages of their cybersecurity journey. WiCyS (pronounced Wee-Sis) is an organ.....»»
3 CIS resources to help you drive your cloud cybersecurity
In the process of moving to the cloud, you need a security-first cloud migration strategy that considers both your security and compliance requirements upfront. In this article, we’ll discuss how you can use resources from the Center for Internet S.....»»
CyberSaint releases NIST CSF Benchmarking Feature
CyberSaint released the NIST Cybersecurity Framework (CSF) Benchmarking Feature, which allows CISOs and security teams to measure their NIST posture against industry peers through a historical maturity graph on the CyberStrong Executive Dashboard. Or.....»»
Accenture partners with Mandiant to improve cybersecurity operations
Accenture and Mandiant, part of Google Cloud, are teaming up to collaboratively deliver cyber resilience services to help organizations more efficiently detect, investigate, respond to and recover from cyberattacks. As part of the partnership, Accent.....»»
Cybersecurity jobs available right now: May 8, 2024
CISO Pinsent Masons | United Kingdom | Hybrid – View job details As a CISO, you will be responsible for the overall security posture of the organisation, ensuring the organisation’s information and technology assets are protected fr.....»»
Security tools fail to translate risks for executives
Organizations are struggling with internal communication barriers, which hinder their ability to address cybersecurity threats, according to Dynatrace. The results indicate that CISOs encounter challenges in aligning security teams with the C-suite,.....»»
How workforce reductions affect cybersecurity postures
In its State of Pentesting Report, Cobalt reveals an industry struggling to balance the use of AI and protecting against it, while facing significant resource and staffing constraints. Pentesting plays a key role in addressing this challenge, equippi.....»»
The $499 Google Pixel 8a is official, with 120 Hz display, 7 years of updates
The new Pixel 8a looks like a mid-range champion. The Pixel 8a. [credit: Google ].....»»
Geologists reveal mysterious and diverse volcanism in lunar Apollo Basin, Chang"e-6 landing site
The far side of the moon is a mysterious place that is never visible from the Earth. The most remarkable feature of the moon is its asymmetry between the lunar near side and far side in composition, crust thickness, and mare volcanism. Scientists hav.....»»
Forescout AI enables security leaders to make confident, informed decisions
Forescout introduced its AI product strategy built to help business leaders and security operators synthesize connected device threats and make decisions with clarity and confidence. “Many cybersecurity vendors have flooded the market with solution.....»»
White House pledges $100 million to help small suppliers shift to EV parts
The Biden administration on Monday said it will spend more than $100 million to help small and medium-sized suppliers retool or expand their factories and improve their energy and cybersecurity infrastructures......»»
Synthetic chemistry approach yields new compounds with potential biomedical applications
Researchers at Rice University have successfully synthesized a group of natural compounds known as fusicoccanes. The molecules found in various living organisms exhibit diverse biological activities, including the ability to modulate protein-protein.....»»
Strategies for preventing AI misuse in cybersecurity
As organizations increasingly adopt AI, they face unique challenges in updating AI models to keep pace with evolving threats while ensuring seamless integration into existing cybersecurity frameworks. In this Help Net Security interview, Pukar Hamal,.....»»
What can AI learn about the universe?
Artificial intelligence and machine learning have become ubiquitous, with applications ranging from data analysis, cybersecurity, pharmaceutical development, music composition, and artistic renderings......»»
BlackBerry CylanceMDR improves cybersecurity defensive strategy
BlackBerry introduced the new and expanded CylanceMDR, offering comprehensive Managed Detection & Response (MDR) protection powered by the Cylance AI platform and augmented with award-winning security operations center analysts for 24×7 threat c.....»»
What is cybersecurity mesh architecture (CSMA)?
Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA approach means designing a security architecture that is composable and scalable with easily extensible interfaces,.....»»
Most companies changed their cybersecurity strategy in the past year
Businesses worldwide have faced a rate of change in the threat environment evidenced by 95% of companies reporting cybersecurity strategy adjustments within just the past year, according to LogRhythm. Strategic shifts within organizations At the hear.....»»
Trend Micro expands AI-powered cybersecurity platform
Trend Micro launched significant additional AI-powered functionality in its platform to secure organizational use of AI and better manage the risks associated with mass adoption of new AI tools. “Great advancements in technology always come wit.....»»
Deep Instinct DIANNA provides malware analysis for unknown threats
Deep Instinct announced the launch of Deep Instinct’s Artificial Neural Network Assistant (DIANNA), an AI-based cybersecurity companion that provides explainability into unknown threats. DIANNA enhances Deep Instinct’s prevention-first approa.....»»
Why do male chicks play more than females? Study finds answers in distant ancestor
Play is widespread, but far from ubiquitous, across the animal kingdom. Especially common in mammals, play is also known to occur in taxa as diverse as birds, fish, octopuses, and even insects. But what is its function, given that natural selection n.....»»
Women rising in cybersecurity roles, but roadblocks remain
The ISC2 study on women in cybersecurity, a comprehensive research effort that collected responses from 2,400 women, has revealed several significant findings. These include promising trends in women’s entry into the profession, their roles wit.....»»