December 2024

TPM 2.0: The new standard for secure firmware

TPM 2.0: The new standard for secure firmware 2024-12-09 at 09:48 By Help Net Security Connected devices are better protected from cyberattacks and less likely to be compromised by errors thanks to the new TPM 2.0 specification from the Trusted Computing Group (TCG). Manufacturers attach a Trusted Platform Module (TPM) to a device to help […]

React to this headline:

Loading spinner

TPM 2.0: The new standard for secure firmware Read More »

India launches two ESA sun-spotters that will fly in incredibly precise formation

India launches two ESA sun-spotters that will fly in incredibly precise formation 2024-12-09 at 08:03 By Laura Dobberstein Proba-3’s Occulter will blot out the sun to create eclipse-like effect Coronagraph can observe India’s space agency last week launched a pair of European Space Agency satellites that will hopefully demonstrate high-precision formation flight techniques that make

React to this headline:

Loading spinner

India launches two ESA sun-spotters that will fly in incredibly precise formation Read More »

Who handles what? Common misconceptions about SaaS security responsibilities

Who handles what? Common misconceptions about SaaS security responsibilities 2024-12-09 at 07:33 By Mirko Zorz In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What common misconceptions do you encounter about the

React to this headline:

Loading spinner

Who handles what? Common misconceptions about SaaS security responsibilities Read More »

What makes for a fulfilled cybersecurity career

What makes for a fulfilled cybersecurity career 2024-12-09 at 07:03 By Help Net Security In this Help Net Security video, Richard Hummel, NETSCOUT’s Director of Threat Intelligence, talks about his journey into cybersecurity and offers insight for those that are interested in pursuing it as a career. The post What makes for a fulfilled cybersecurity

React to this headline:

Loading spinner

What makes for a fulfilled cybersecurity career Read More »

The pillars of success: Planning, preparation and collaboration

The pillars of success: Planning, preparation and collaboration 2024-12-09 at 07:03 By This year’s Elliot A. Boxerbaum award winner, TLC Engineering Solutions with HOK, ensured seamless system transition with diligent planning, preparation and collaboration. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

The pillars of success: Planning, preparation and collaboration Read More »

We can’t make this stuff up: tech companies Palantir and Anduril form fellowship for AI adventures

We can’t make this stuff up: tech companies Palantir and Anduril form fellowship for AI adventures 2024-12-09 at 06:48 By Simon Sharwood Meanwhile, Sauron secures funding. Really. Two tech businesses that were independently named after objects from The Lord of the Rings have formed a partnership – or should that be a fellowship?… This article

React to this headline:

Loading spinner

We can’t make this stuff up: tech companies Palantir and Anduril form fellowship for AI adventures Read More »

Top cybersecurity books for your holiday gift list

Top cybersecurity books for your holiday gift list 2024-12-09 at 06:48 By Help Net Security The holiday season is approaching, and with it, the tradition of gift-giving. For professionals and enthusiasts alike, a well-chosen book can provide both knowledge and inspiration. To help with ideas on what to give, we’ve compiled a list of cybersecurity

React to this headline:

Loading spinner

Top cybersecurity books for your holiday gift list Read More »

Businesses plagued by constant stream of malicious emails

Businesses plagued by constant stream of malicious emails 2024-12-09 at 06:03 By Help Net Security 36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion emails processed through their security services between November 1, 2023 and October 31, 2024 – and 2.3% of those contained

React to this headline:

Loading spinner

Businesses plagued by constant stream of malicious emails Read More »

Kyndryl’s consulting business may be less than it seems

Kyndryl’s consulting business may be less than it seems 2024-12-08 at 22:18 By Thomas Claburn Insiders say it’s largely a matter of labeling Special report  Kyndryl has bet on becoming a consulting-led business, but among those who recently left the IT biz there’s skepticism about the corporation’s claims.… This article is an excerpt from The

React to this headline:

Loading spinner

Kyndryl’s consulting business may be less than it seems Read More »

How Chinese insiders are stealing data scooped up by President Xi’s national surveillance system

How Chinese insiders are stealing data scooped up by President Xi’s national surveillance system 2024-12-08 at 19:03 By Jessica Lyons ‘It’s a double-edged sword,’ security researchers tell The Reg Feature  Chinese tech company employees and government workers are siphoning off user data and selling it online – and even high-ranking Chinese Communist Party officials and

React to this headline:

Loading spinner

How Chinese insiders are stealing data scooped up by President Xi’s national surveillance system Read More »

You’re so bad at recycling, this biz built an AI to handle it for you

You’re so bad at recycling, this biz built an AI to handle it for you 2024-12-08 at 12:54 By Brandon Vigliarolo Maybe start getting better at sorting your trash before these ML garbage bots gain sentience? If our AI robot slaves ever decide to revolt, they might start in the most thankless place possible: The

React to this headline:

Loading spinner

You’re so bad at recycling, this biz built an AI to handle it for you Read More »

British boffins build diamond battery capable of working for a millennium or five

British boffins build diamond battery capable of working for a millennium or five 2024-12-08 at 11:33 By Iain Thomson Carbon-14 decay could be coming to an implant in you Video  The UK Atomic Energy Authority (UKAEA) and the University of Bristol have built a diamond battery capable of delivering power for thousands of years.… This

React to this headline:

Loading spinner

British boffins build diamond battery capable of working for a millennium or five Read More »

Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast

Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast 2024-12-08 at 11:03 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449) Veeam has fixed two vulnerabilities in Veeam Service Provider Console (VSPC),

React to this headline:

Loading spinner

Week in review: Veeam Service Provider Console flaws fixed, Patch Tuesday forecast Read More »

Korean CEO Arrest: Added DDoS Feature to Satellite Receivers

Korean CEO Arrest: Added DDoS Feature to Satellite Receivers 2024-12-07 at 20:18 View original post at vpnMentor A South Korean CEO and five employees were arrested for manufacturing and exporting satellite receivers equipped with Distributed Denial of Service (DDoS) functionalities. This action violated the country’s Act on Promotion of Information and Communications Network Utilization and

React to this headline:

Loading spinner

Korean CEO Arrest: Added DDoS Feature to Satellite Receivers Read More »

Inside Nvidia’s takeover of the AI world — and why its success shouldn’t be a surprise

Inside Nvidia’s takeover of the AI world — and why its success shouldn’t be a surprise 2024-12-07 at 18:04 By Alex Tapscott For some, Nvidia’s rapid ascent to being the world’s largest company was a shock, but for anyone paying attention their eventual success should have been obvious. This article is an excerpt from Latest

React to this headline:

Loading spinner

Inside Nvidia’s takeover of the AI world — and why its success shouldn’t be a surprise Read More »

Microsoft teases Copilot Vision, the AI sidekick that judges your tabs

Microsoft teases Copilot Vision, the AI sidekick that judges your tabs 2024-12-07 at 16:03 By Richard Speed Edge-exclusive tool promises ‘second set of eyes’ for browsing Microsoft has rolled out a Copilot Vision preview that says more about how poorly websites are designed rather than justifying the need to bring more AI into users’ lives.…

React to this headline:

Loading spinner

Microsoft teases Copilot Vision, the AI sidekick that judges your tabs Read More »

Euro cloud body heads off to Microsoft’s HQ to check its keeping promises

Euro cloud body heads off to Microsoft’s HQ to check its keeping promises 2024-12-07 at 14:36 By Richard Speed Wine-tasting seems to be an essential part of an EU-friendly Azure Local Exclusive  Microsoft and the Cloud Infrastructure Service Providers of Europe (CISPE) trade body this week kicked off their technical summit to assess the Windows

React to this headline:

Loading spinner

Euro cloud body heads off to Microsoft’s HQ to check its keeping promises Read More »

Digital Isle of Man: For all your connected tax haven needs?

Digital Isle of Man: For all your connected tax haven needs? 2024-12-07 at 11:33 By Liam Proven Fantasizing about leaving the mess at home behind? Pretty island packed with medieval ruins promotes itself as a venue for e-business The Isle of Man Government runs an annual conference to promote the tiny nation as a destination

React to this headline:

Loading spinner

Digital Isle of Man: For all your connected tax haven needs? Read More »

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar 2024-12-07 at 11:03 By Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to stolen data, disrupted operations, and massive business losses. Even top organizations struggle to secure privileged accounts. Why? Traditional Privileged Access Management (PAM) solutions often fall

React to this headline:

Loading spinner

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar Read More »

Scroll to Top