Apple app developer news Android app developer news

application security news search results

Developer news items we found relating to application security

78 results
Enterprises need a software security program

Enterprises need a software security program

Tuesday, January 30, 2018 by

The answer to the “why” enterprises need a software security program question is pretty straightforward. There are no circumstances under which any but the smallest firms can expect a collection of independent activities - a pen test here, an hour of training there, some free tools that may or may not work as advertised - will consistently result in appropriately secure... Read More
Most cryptocurrency mobile apps are vulnerable

Most cryptocurrency mobile apps are vulnerable

Thursday, November 30, 2017 by

Over 1,300 crypto currencies exist today with over $300 Billion market capitalization. One of the most popular and oldest cryptocurrency - Bitcoin has almost reached $10,000 price after several months of fluctuation, but continuous and steady growth.A wide spectrum of mobile applications for cryptocurrencies were released during the last few years by various startups, i... Read More
DevSecOps is important and here is why

DevSecOps is important and here is why

Friday, October 20, 2017 by

In the digital age, securing your development projects against malicious hackers can be quite the challenge. And when you take security and try to scale security to an enterprise, the challenge seems insurmountable. Evident by the frequent hacking incidents we see come through the news.Enter DevSecOps. DevSecOps is a methodology that interweaves the aspects of DevOps an... Read More
Automated Security as a Service platform by ShiftLeft launches

Automated Security as a Service platform by ShiftLeft launches

Monday, October 16, 2017 by

ShiftLeft Inc. has introduced an automated Security as a service (SECaaS) for cloud software that creates custom security and threat detection for each application it supports. With ShiftLeft, organizations can now secure their cloud applications as part of their continuous integration pipeline, rather than merely reacting to threats discovered in production. ShiftLeft ... Read More
Sending out an S.O.S. for SMS

Sending out an S.O.S. for SMS

Wednesday, October 04, 2017 by

What a difference a year makes. Just one year after the National Institute of Standards and Technology issued guidance that found SMS is insecure and no longer suitable as a strong authentication mechanism, it has walked all of that back.At the time the original draft was published, it was highly unusual for any US government agency to get out in front of the security i... Read More
Veracode announced two new key integrations

Veracode announced two new key integrations

Friday, August 11, 2017 by

Veracode, a software security company acquired by CA Technologies, has announced the Veracode HPE Application Lifecycle Manager (ALM) Flaw Synchronizer Plug-in, which empowers development and QA/release engineers to fix security vulnerabilities early in the Software Development Lifecycle (SDLC). The company also announced an enhanced integration to the Veracode Applicat... Read More
Checkmarx acquired Codebashing

Checkmarx acquired Codebashing

Tuesday, July 25, 2017 by

Checkmarx has acquired Codebashing, an application security education company that delivers Game-like AppSec Training for Developers.Traditional secure coding education is ineffective and cannot scale to deliver continuous and across the board secure coding knowledge. Long training courses disrupt the developer’s daily routine and don't address the specific challenge as... Read More
Software developers are easy targets for hackers study finds

Software developers are easy targets for hackers study finds

Thursday, July 20, 2017 by

Netsparker Ltd., a company in the web applications security industry, has released survey results showing that most software developers make themselves easy targets for hackers, even when they are behind a corporate firewall. The primary reason is not that their web server software is out of date, however. Instead, it is largely the result of developers running vulnerab... Read More
With DevOps security must work differently

With DevOps security must work differently

Tuesday, June 27, 2017 by

Because “software is eating the world,” as Mark Andreessen famously noted, application security gets harder every day; every line of code written opens organizations to new vulnerabilities and breaches. Furthermore, legacy solutions, such as static analysis, dynamic analysis and web application firewalls have failed to keep pace with Agile and DevOps practices. Teams ne... Read More
VASCO launches overlay detection in DIGIPASS

VASCO launches overlay detection in DIGIPASS

Thursday, June 22, 2017 by

VASCO Data Security International, Inc., a provider of identity, security and business productivity solutions, has announced its ability to help organizations detect and mitigate mobile application overlay attacks through added functionality in the DIGIPASS for Apps Runtime Application Self-Protection (RASP) module.Overlay attacks are increasingly being deployed to stea... Read More
Why runtime application self-protection is critical for app security

Why runtime application self-protection is critical for app security

Tuesday, June 20, 2017 by

Today most of us go about implementing security from the outside in. The common practice is to start by defining a perimeter and trying to defend it with various security tools. Even though perimeters have been porous for more than a decade, we still can’t give up this notion that if we build a better wall we can keep our enterprises safer.Certainly that is where most e... Read More
DevSecOps will help security and developers play nice

DevSecOps will help security and developers play nice

Thursday, June 15, 2017 by

Veracode, a security software company acquired by CA Technologies, has announced the results of a study examining the relationships between application developers and security teams.The study, conducted in conjunction with Enterprise Strategy Group (ESG), shows that despite the pervasive belief that security and development teams have conflicting priorities, initiatives... Read More
Enterprise threat dubbed HospitalGown infests thousands of apps

Enterprise threat dubbed HospitalGown infests thousands of apps

Tuesday, June 06, 2017 by

Appthority, an enterprise mobile threat protection company, published research on a newly discovered backend data exposure vulnerability, dubbed HospitalGown, that highlights the connection between mobile apps and insecure backend databases containing enterprise data. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applica... Read More
Improve mobile app security by turning it into code

Improve mobile app security by turning it into code

Monday, May 08, 2017 by

Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong. Far more than any one person can be expert in. It's unfair to think that a software developer, who is already supposed to be expert in all the latest software languages, frameworks and best practices, should als... Read More
The hottest skills needed in the freelance job market to get hired

The hottest skills needed in the freelance job market to get hired

Thursday, May 04, 2017 by

Upwork has released its newest quarterly index of the hottest skills in the U.S. freelance job market. The Upwork Skills Index ranks the site’s 20 fastest-growing skills and is part of a quarterly series that sheds light on new and emerging skills freelancers are providing. According to a recent report, nearly half (49%) of hiring managers use freelancers to access skil... Read More
Red Hat and Avi Networks join forces to automate the enterprise app lifecycle

Red Hat and Avi Networks join forces to automate the enterprise app lifecycle

Wednesday, May 03, 2017 by

Avi Networks has collaborated with Red Hat to simplify and automate the enterprise application development and deployment lifecycle. Through the collaboration, Avi Networks and Red Hat integrated technologies to give enterprises the combined power of a container application platform, IT automation, software load balancing, and container networking services. With the con... Read More
Instart Logic brings Helios AI-Driven security out into the open

Instart Logic brings Helios AI-Driven security out into the open

Friday, April 28, 2017 by

In ancient mythology, Helios was the Greek god of the sun streaking across the heavens in a chariot shining much-needed light onto a dark and dangerous world. That’s exactly what Instart Logic, is doing with their latest announcement of Helios - "using artificial intelligence to illuminate and solve today’s most challenging digital security issues."Web application attac... Read More
WhiteSource Bolt detects vulnerable open source components

WhiteSource Bolt detects vulnerable open source components

Thursday, March 30, 2017 by

WhiteSource, a continuous open source security and compliance management company, has announced the launch of a new open source management tool integrated within the Microsoft Visual Studio Team Services (VSTS) and Team Foundation Server (TFS) platforms - the WhiteSource Bolt (Bolt).Bolt is fully immersed within the VSTS and TFS products, so users can detect vulnerable ... Read More
ImmuniWeb Mobile launches to offer better mobile security testing

ImmuniWeb Mobile launches to offer better mobile security testing

Wednesday, March 15, 2017 by

High-Tech Bridge announces the launch of ImmuniWeb Mobile as part of ImmuniWeb Application Security Testing Platform. The new offering will provide comprehensive assessment of iOS and Android mobile applications, mobile infrastructure backend and data channel encryption. All ImmuniWeb Mobile packages are provided with a zero false-positives SLA. The mobile application s... Read More
Veracode sells to CA Technologies for $614M

Veracode sells to CA Technologies for $614M

Wednesday, March 08, 2017 by

CA Technologies announced it has signed a definitive agreement to acquire Veracode, a company that is securing web, mobile and third-party applications across the software development lifecycle, for approximately $614 million in cash. The transaction is expected to close in the first quarter of fiscal year 2018, and is subject to customary closing conditions, including ... Read More
80 percent of web apps have security flaws

80 percent of web apps have security flaws

Tuesday, February 14, 2017 by

Data collected by Contrast Labs has revealed that sensitive data exposures, which include missing and weak encryption, are the top vulnerability plaguing 69 percent of web applications and accounting for 26 percent of all vulnerabilities. Their research has also found that 80 percent of tested software applications had at least one vulnerability, with an average of 45 v... Read More
Checkmarx opens beta support for Scala programming language

Checkmarx opens beta support for Scala programming language

Wednesday, February 01, 2017 by

Checkmarx, an application security testing company, has announced open beta support of the Scala programming language. The new capability adds the ability to analyze and remediate security risks and vulnerabilities exposed in projects written using Scala code.The added capability not only allows the detection of vulnerabilities within Scala code, but also the ability to... Read More
Scanning JavaScript for vulnerabilities: How the impossible is now possible

Scanning JavaScript for vulnerabilities: How the impossible is now possible

Friday, January 13, 2017 by

Javascript is everywhere, and it's awesome! But the world most popular language can be riddled with problems if you aren't a careful programmer.There is a saying that speaks to the incredible popularity of JavaScript as a programming language and it goes like this: “any application that can be written in JavaScript, will eventually be written in JavaScript.” The we... Read More
How do we simplify east-west security? The imperative path is upon us

How do we simplify east-west security? The imperative path is upon us

Monday, December 05, 2016 by

Ahhh, the endless saga of streamlining hazards around application security: let’s talk about the East-West component of the conundrum. But first, it’s important to clarify the variances of ‘East-West’ vs. ‘North-South’ traffic in a typical data center environment. By definition: North-South traffic is the communication that occurs between server applications deploy... Read More
Foxit WebPDF 2.0 launches with REST API and Docker support

Foxit WebPDF 2.0 launches with REST API and Docker support

Thursday, November 24, 2016 by

Foxit Software has announced the release of Foxit WebPDF Viewer 2.0. The new release includes enhanced rendering, performance and security features, equipping web developers for better customization, integration and document control.There are several performance enhancements in WebPDF 2.0, including faster parsing and rendering of local PDFs, lower levels of server stra... Read More
New VS plugin from Checkmarx lets DevOps teams to rapidly embed security

New VS plugin from Checkmarx lets DevOps teams to rapidly embed security

Wednesday, November 16, 2016 by

Checkmarx just announced a new Checkmarx plugin for the Microsoft Visual Studio Team Services platform. The new Checkmarx (CxSAST) Microsoft Visual Studio Team Services Plugin allows organizations with agile development practices to embed security into their software development lifecycle (SDLC) without the delays traditionally caused by application security t... Read More
Comparing server virtualization and containers

Comparing server virtualization and containers

Monday, November 14, 2016 by

Apcera is a San Francisco-based company building the next-generation container management platform, and they believe that cloud computing is an ever-evolving way of interfacing with technology. With Apcera’s platform, they aim to solve the hard problems that enterprises face in embracing the new world of containers to unlock the potential of modern architectur... Read More
What is offline-first application design anyway

What is offline-first application design anyway

Wednesday, November 09, 2016 by

Offline first application development is the latest iteration of progressive enhancement in application development. It means creating applications to work without internet access in the most resource constrained environments like underground train stations or in remote places abroad. Features can be added to make the applications more robust once internet access is ava... Read More
What happens to security when your apps go to the cloud

What happens to security when your apps go to the cloud

Wednesday, November 09, 2016 by

When Marc Andreessen wrote, “software is eating the world,” he meant that every business is literally turning into software. The problem is that every line of code you write makes you easier to attack. Historically, we dealt with security by putting up walls and scanning. But the complexity of modern software environments has made these approaches ineffective ... Read More
The impact of fake retail apps hitting the Apple App Store this year

The impact of fake retail apps hitting the Apple App Store this year

Tuesday, November 08, 2016 by

Holiday retail woes have hit a little early this year, with hundreds of fake retail and product apps appearing in Apple’s App Store recently. The New York Times reports counterfeiters have disguised apps as retail chains like Dollar Tree and Foot Locker, department stores like Nordstrom and even luxury brands like Jimmy Choo. With Apple known to have a st... Read More
RealVNC just launched VNC Connect with cloud, direct, and hybrid options

RealVNC just launched VNC Connect with cloud, direct, and hybrid options

Wednesday, November 02, 2016 by

RealVNC, the original developer and provider of VNC remote access and control software, has just announced the release of a major new remote access product called VNC Connect.  Launched at the SpiceWorld IT Conference in Austin, Texas, VNC Connect combines the convenience of a cloud service with the flexibility of direct connections, giving organizations the abilit... Read More
HPE Study identifies significant barriers with integrating security and DevOps

HPE Study identifies significant barriers with integrating security and DevOps

Tuesday, October 25, 2016 by

The HPE Application Security and DevOps Report just released, which discusses in depth where organizations are at in their implementation of DevOps, and how application security fits within this new model. While there is a perception that security and DevOps go hand-in-hand, there are significant gaps between the opportunity of incorporating security as a natural part o... Read More
The use of vulnerable open source components putting more software at risk

The use of vulnerable open source components putting more software at risk

Tuesday, October 18, 2016 by

Veracode has released the findings in its annual State of Software Security Report (SoSS). The seventh edition of the report presents metrics drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. The report revealed that the continued and persistent use of components in software development is creating ... Read More
Security First: 5 tips for building a secure mobile app from the ground up

Security First: 5 tips for building a secure mobile app from the ground up

Wednesday, October 05, 2016 by

With more than two billion smartphone users worldwide, the app market has exploded — along with risks. Mobile app developers are still struggling to make security a priority and by 2017, cyber-attacks via vulnerable apps are anticipated to account for 75% of all mobile security breaches. Given what's at stake, it's critical that developers build apps that are &ldq... Read More
App Marketers Will Lose up to $100 Million in 2016 Because of Fraud

App Marketers Will Lose up to $100 Million in 2016 Because of Fraud

Friday, September 23, 2016 by

AppsFlyer has released new data forecasting that app marketers will lose up to $100 million in 2016 due to mobile app install and engagement advertising fraud - as well as revealing the countries that have the highest rates of this type of ad fraud. The study’s findings are based on the company’s new anti-fraud technology, called DeviceRank, which also just la... Read More
Hewlett Packard Enterprise Introduces New Application Security Solutions

Hewlett Packard Enterprise Introduces New Application Security Solutions

Monday, September 19, 2016 by

Hewlett Packard Enterprise (HPE) has introduced the HPE Fortify Ecosystem and Fortify on Demand (FoD) continuous application monitoring service. The online marketplace and service are designed to help organizations create secure applications by naturally integrating security testing processes and resources throughout the fast-paced software development lifecycle (SDLC).... Read More
Why Big Data Could Also Mean Big Security Breaches for Insurance Companies

Why Big Data Could Also Mean Big Security Breaches for Insurance Companies

Friday, September 02, 2016 by

Quadrant Information Services is warning that digitization is a two-edged sword: with increased capability comes an increased danger of expensive—and possibly actionable—data security breaches.Big Data has been one of the largest growing developments for insurance. Car insurance companies, for instance, used to price policies based on only 10 to 20 rate bearing fac... Read More
Checkmarx Tells Us Why App Developers Should Care About App Security

Checkmarx Tells Us Why App Developers Should Care About App Security

Thursday, August 18, 2016 by

We recently had a conversation with Emmanuel Benzaquen at Checkmarx to talk about how they are able to scrutinize code with a fine-toothed comb and find vulnerabilities early and why other developers need to be doing the same. With clients such as Coca-Cola, SAP, and Salesforce, they seem to be carving out a niche for application security in the crowded tech-s... Read More
Synopsys Makes Updates to its Seeker Runtime Security Analysis Tool

Synopsys Makes Updates to its Seeker Runtime Security Analysis Tool

Monday, August 08, 2016 by

Synopsys has released the latest version of its Seeker runtime security analysis solution. Seeker analyzes web application code and data flows at runtime using a technique known as an Interactive Application Security Testing (IAST), which detects and confirms exploitable security vulnerabilities and provides insight that allows developers to address their root causes. T... Read More
Cloud Security Alliance Issues Mobile Application Security Testing Report

Cloud Security Alliance Issues Mobile Application Security Testing Report

Monday, August 01, 2016 by

The Cloud Security Alliance has released a new report surrounding its Mobile Application Security Testing Initiative. The purpose of the report is to provide the Alliance’s insight into building out a roadmap for establishing a more secure cloud ecosystem to protect mobile applications.The Alliance’s Mobile Application Security Testing (MAST) Initiative offers... Read More
WaveMaker Adds Security Enhancements to Its Rapid Application Development Platform

WaveMaker Adds Security Enhancements to Its Rapid Application Development Platform

Friday, July 15, 2016 by

WaveMaker has announced two new security enhancements to its enterprise-class Rapid Application Development platform. The WaveMaker platform now supports Single Sign-on for WaveMaker-built and deployed applications using Central Authentication Server (CAS), which permits users to access multiple applications by providing credentials such as UserID and password only once... Read More
Why There Is a Huge Gap Between IT and Security Professionals

Why There Is a Huge Gap Between IT and Security Professionals

Wednesday, June 15, 2016 by

Prevoty surveyed over 1,000 IT and security professionals to learn how companies are approaching application security on a daily basis, as well as the type of struggles these individuals experience and what they would change about the process.The findings show there seems to be a disconnect between IT and security professionals as can be seen from the followin... Read More
Prioritizing Proactivity in a Complex IT World

Prioritizing Proactivity in a Complex IT World

Friday, June 10, 2016 by

As a business’s technology infrastructure grows in complexity, IT teams struggle to take a proactive approach to infrastructure monitoring. Furthermore, the C-suite is placing more emphasis on IT’s responsibility to drive the business forward, adding additional pressure to the need to get ahead of performance problems or system outages before they occur. We sat dow... Read More
Orasi Software and Saltworks Security Form New Application Security Venture

Orasi Software and Saltworks Security Form New Application Security Venture

Monday, June 06, 2016 by

Orasi Software and Saltworks Security have announced an agreement to form a new cooperative venture, where Orasi will contribute quality-focused solution sales, support, consulting and training services that leverage Saltworks application security services. The resulting collaboration will offer an all-inclusive security offering of planning, deployment, training and on... Read More
F5 Networks Introduces New Security Functionality to DevOps Software

F5 Networks Introduces New Security Functionality to DevOps Software

Wednesday, May 18, 2016 by

F5 Networks has launched new software-based solutions that give companies the opportunity to take advantage of the benefits provided by traditional data center, cloud, and hybrid architectures.The new products include:BIG-IP 12.1 software: Offers application services with enhanced public cloud integration and security policies for on-premises and hybrid cloud environmen... Read More
Application Security Market to Triple in the Next 5 Years

Application Security Market to Triple in the Next 5 Years

Wednesday, May 11, 2016 by

A new market research report has been published by MarketsandMarkets which predicts that the global application security market size is expected to triple, growing from $2.24 Billion in 2016 to $6.77 Billion by 2021. The report is titled “Application Security Market by Component (Solutions, Services), Solutions (Web Application Security, Mobile Application Security), Te... Read More
Five Common Mobile App Security Vulnerabilities - And How to Fix Them

Five Common Mobile App Security Vulnerabilities - And How to Fix Them

Saturday, April 30, 2016 by

Mobile app security leaves much to be desired. That was the conclusion of a 2016 Hewlett Packard Enterprise (HPE) study which found that a staggering 96 percent of 36,000 mobile apps failed at least one of 10 privacy checks. Three years ago, a similar HPE study found that 97 percent of 2,000 apps reviewed held insecure private information. As mobile app usage conti... Read More
Department of Homeland Security Creates Mobile Application Playbook

Department of Homeland Security Creates Mobile Application Playbook

Tuesday, April 26, 2016 by

The U.S. Department of Homeland Security (DHS), Office of the Chief Technology Officer (OCTO), has created The Mobile Application Playbook (MAP), a DHS sponsored reference guide to assist federal agencies with the planning, management, and execution of mobile application projects.The MAP publication provides a roadmap for creating mobile applications and is designed to ... Read More
Deploying New Applications is a Top Driver for Identity and Access Management

Deploying New Applications is a Top Driver for Identity and Access Management

Tuesday, April 19, 2016 by

SecureAuth Corporation has published results of a survey on enterprise priorities within the identity and access management (IAM) market. The research was conducted in association with Decision Analyst and received responses from 230 IT security professionals in the U.S. and U.K.    When asked why their company has initiated new identity projects in the past... Read More
Study Shows Developers Wield Clout When Choosing an Organization’s Technology

Study Shows Developers Wield Clout When Choosing an Organization’s Technology

Wednesday, March 30, 2016 by

According to a recent survey, developers are playing a critical role in determining the IT technologies used by companies today. The annual “Future of Application Development and Delivery Survey” was performed by NGINX and received responses from more than 1,800 IT professionals.According to the survey report, 74 percent of respondents said developers are responsible fo... Read More
Security Startup Provider buguroo Launches New Threat Intelligence Platform

Security Startup Provider buguroo Launches New Threat Intelligence Platform

Wednesday, February 17, 2016 by

Security provider buguroo, a U.S. startup and spinoff of Deloitte’s European Security Operations Center (SOC), is launching bugThreats, a threat intelligence platform (TIP) that looks outside the enterprise infrastructure and focuses on useful intelligence gathered where the compromised end users, and their stolen data, are.Focused on intelligence and not protection, bu... Read More
Cloud Based Apps to Provide Big Returns for Companies in 2016

Cloud Based Apps to Provide Big Returns for Companies in 2016

Saturday, December 26, 2015 by

Appian recently surveyed over 300 IT decision makers to provide insight into how companies will approach mobilizing their businesses in 2016. The survey was conducted by Harris Poll. According to the resulting report, a majority of the respondents believe cloud-based applications/solutions (70%) and enterprise mobility (61%) will provide the top returns to in 2016,... Read More
HP Gives Top 5 Predictions for Changes Coming to DevOps in 2016

HP Gives Top 5 Predictions for Changes Coming to DevOps in 2016

Tuesday, December 01, 2015 by

It has long been a cliché to say that we’re living in a digital revolution. But it’s also truer with every day that passes. Savvy businesses are using the rapid pace and malleability of software to drive more and more differentiation into the marketplace. They’re using instant feedback from users to improve software continuously. And increasingly, they’re doing thi... Read More
New Mobile Security Report Shows Most Apps Have Critical Vulnerabilities

New Mobile Security Report Shows Most Apps Have Critical Vulnerabilities

Tuesday, November 10, 2015 by

Checkmarx and AppSec Labs have released a new mobile app security titled “The State of Mobile Application Security 2014-2015”. Among the findings of the report is that the typical app is exposed to an average of 9 different vulnerabilities. The report also indicates in situations where vulnerabilities are built into the code or application logic, the vulnerability of iO... Read More
Checkmarx Creates Campaign to Help Companies With Security Awareness

Checkmarx Creates Campaign to Help Companies With Security Awareness

Tuesday, October 13, 2015 by

Checkmarx has release a new microsite to help companies raise awareness within their development teams for secure development practices. The campaign provides a kit that includes physical and online tools to promote safe application development within their organization.The physical kit offers a package to help raise awareness within a development organization for appli... Read More
AppSecUSA Security Conference to Delve Into Application and Cloud Security

AppSecUSA Security Conference to Delve Into Application and Cloud Security

Friday, September 11, 2015 by

There is still time to participate in OWASP's 12th Annual AppSecUSA Security Conference designed for developers and security experts focusing on application and cloud security. The conference will be held in San Francisco on September 24-25 and a separate two day training program will be offered September 22-23.Held at the Hyatt Regency San Francisco, more than 40 speak... Read More
New Report Highlights Wide Ranging Cybersecurity Challenges

New Report Highlights Wide Ranging Cybersecurity Challenges

Wednesday, September 02, 2015 by

Cybersecurity Ventures has released its Cybersecurity Market Report for Q3 2015 which provides an overview of software development and application security trends, statistics, best practices, and resources. Highlights of the report include:- “The SANS Institute 2015 State of Application Security Report” states that many information security engineers don’t understa... Read More
How Frightened Should Android Developers Be Of Stagefright

How Frightened Should Android Developers Be Of Stagefright

Wednesday, July 29, 2015 by

Stagefright is a new Android vulnerability which was found and announced by Joshua J. Drake, Zimperium zLabs Vice President of Platform Research and Exploitation. Specifically the company says Stagefright is: “…what we believe to be the worst Android vulnerabilities discovered to date.”Here is a rundown according to Zimperium, “These issues in Stagefright code criticall... Read More
Kony Updates MobileFabric To Help The Enterprise With Mobile Development

Kony Updates MobileFabric To Help The Enterprise With Mobile Development

Thursday, July 23, 2015 by

Kony has updated its MobileFabric backend mobile infrastructure with new API management, mobile a management (MAM), analytics and application performance management (APM) capabilities.The updates provide developers greater access to open and web development standards and technologies offering front-end tools and frameworks, including native iOS, Android, Windows, HTML5/... Read More
Study Shows 60 Percent of Security Vulnerabilities Are Not Fixed

Study Shows 60 Percent of Security Vulnerabilities Are Not Fixed

Friday, June 26, 2015 by

Waratek recently surveyed senior security professionals to ascertain the current climate of security and risk management for enterprises. According to the results, two-thirds of senior security professionals polled said they remediate 40 percent or less of the security vulnerabilities discovered by software application security testing (SAST) tools. Other findings ... Read More
Contrast Security Release New Enterprise Application Security Platform

Contrast Security Release New Enterprise Application Security Platform

Tuesday, June 09, 2015 by

Contrast Security has release Contrast Enterprise, a new application security product to integrate defenses across development and operations, offering vulnerability assessment, security visibility and attack protection throughout the application lifecycle. Contrast Enterprise offers Runtime Application Self-Protection (RASP), which provides deep security instrumen... Read More
HP Releases New Solutions for Mobile App Development and Management

HP Releases New Solutions for Mobile App Development and Management

Tuesday, April 07, 2015 by

HP has announced a number of new software releases that utilize HP's assets in big data analytics, application lifecycle management, IT operations management and security. Businesses can use HP's solutions to accelerate application delivery, test and monitor apps across multiple devices and operating systems, and provide mobile users with secure experiences.Measure the ... Read More
 Checkmarx Releases New CxRASP Platform Offering Runtime Application Self Protection

Checkmarx Releases New CxRASP Platform Offering Runtime Application Self Protection

Friday, February 06, 2015 by

Checkmarx has announced the launch of its Runtime Application Self-Protection (RASP) solution, CxRASP, which utilizes two-point instrumentation technology to continuously observe an app’s bidirectional data flow, enabling the detection and defense against real-time attacks.CxRASP is the latest addition to the Checkmarx Application Security Hub which provides solutions f... Read More
NowSecure App Testing (formerly ViaLab) Launches New Mobile Application Security Testing Suite

NowSecure App Testing (formerly ViaLab) Launches New Mobile Application Security Testing Suite

Friday, January 23, 2015 by

NowSecure App Testing (formerly ViaLab) has announced its new mobile application security testing suite, available in both a free and paid version.The mobile application security testing suite speeds up the process of identifying vulnerabilities and risks for third-party and custom mobile apps. The platform helps developers locate problems such as Heartbleed before they... Read More
Mobile Devices Are the Weakest Link for Enterprise Mobility Solutions

Mobile Devices Are the Weakest Link for Enterprise Mobility Solutions

Tuesday, December 09, 2014 by

The time has come when the fact is accepted and discussed at large, the one that we have been trying to resist since long. We all are aware that today mobile Apps for Enterprise Management consider mobility at their core. It has given new peripheries to businesses by transforming operations – better engagement with customers – and of course an innovative appro... Read More
MetaIntelli and Arxan Technologies Partner to Identify and Mitigate Mobile Apps Security Threats

MetaIntelli and Arxan Technologies Partner to Identify and Mitigate Mobile Apps Security Threats

Sunday, November 16, 2014 by

MetaIntelli and Arxan Technologies have partnered together to provide mobile app developers with a comprehensive approach to identify and mitigate mobile apps against security and privacy risks with nonstop protection. The two companies bring together complementary technologies that leverage MetaIntelli’s intelligent, autonomic cloud based mobile app risk identific... Read More
A Look Ahead: The Top Ten Strategic Technology Trends for 2015

A Look Ahead: The Top Ten Strategic Technology Trends for 2015

Wednesday, November 05, 2014 by

Its time for the prognosticators to get out their crystal balls and make predictions for 2015. And as it relates to the top 10 technology strategic trends, Gartner has done just that. Gartner defines a strategic technology trend as one with the potential for significant impact on an organization in the next three years. Factors that denote significant impact includ... Read More
5 Things To Consider When Monitoring Your App

5 Things To Consider When Monitoring Your App

Friday, October 17, 2014 by

Mobile is explosive in nature. That being said, it has been shown more than once that across verticals, it’s very expensive to be naïve as to the expected user adoption when it comes to mobile applications. You quickly come to realize you need to understand the behavior of the application in production. Mobile monitoring is materially different from web monitoring,... Read More
LANDESK Offers New App Wrapping Capabilities to Its Enterprise Mobility Management Platform

LANDESK Offers New App Wrapping Capabilities to Its Enterprise Mobility Management Platform

Wednesday, October 08, 2014 by

LANDESK has announced the release of new features and upgrades to its Enterprise Mobility Management platform, including an application wrapping feature. This new feature will allow IT departments to add another layer of security to the enterprise apps they supply to their users.The solution allows an IT administrator to wrap an application in one step and deploy it to ... Read More
HP Launches Cloud Managed Application Self Protection Service

HP Launches Cloud Managed Application Self Protection Service

Friday, September 12, 2014 by

HP has introduced HP Application Defender, a cloud-managed application self-protection service that provides immediate visibility and actively defends production applications against attacks.As HP said in the recent announcement, “As the number and complexity of enterprise applications grows, the attack surface for exploits increases exponentially, leaving enterpri... Read More
JScrambler Now Protects Node.js with Version 3.6 of HTML5/JavaScript App Protection Service

JScrambler Now Protects Node.js with Version 3.6 of HTML5/JavaScript App Protection Service

Friday, September 12, 2014 by

JScrambler, a web application security company, has announced the release of JScrambler 3.6, the latest version of its HTML5/JavaScript protection service.With this new version, Node.js applications are now supported, making JScrambler a more complete solution to protect JavaScript source code from the client to the server. This release was fully tested with Node.js rel... Read More
HP Internet of Things Study Shows Majority of IoT Devices Contain Serious Vulnerabilities

HP Internet of Things Study Shows Majority of IoT Devices Contain Serious Vulnerabilities

Monday, August 04, 2014 by

HP has released new research, The Internet of Things State of the Union Study, which reveals that 70 percent of the most commonly used Internet of Things (IoT) devices contain serious vulnerabilities. The study is an outgrowth of HP’s OWASP Internet of Things Top 10 Project. The projects goal is to educate the IT community on the main facets of Internet of Things s... Read More
NT OBJECTives Offers New On Demand Mobile Security Testing

NT OBJECTives Offers New On Demand Mobile Security Testing

Friday, April 18, 2014 by

NT OBJECTives, a provider of automated web application security solutions, is now offering the NTOMobile On-Demand platform powered by NTOSpider, a new security service specifically designed for mobile application testing, including mobile client native code and back-end web services. The platform delivers a way for security teams to complete comprehensive mobile a... Read More
Alpha Software Launches Alpha Anywhere 2.0 for Building HTML5 and Hybrid Apps

Alpha Software Launches Alpha Anywhere 2.0 for Building HTML5 and Hybrid Apps

Wednesday, April 09, 2014 by

Alpha Software has announced the release of Alpha Anywhere 2.0, a front-end to back-end, prototype-to-production environment for rapidly developing and deploying enterprise-level, cross-platform mobile and web business applications. Alpha Anywhere 2.0 incorporates PhoneGap Build integration, enhanced security, built-in support for high-quality i... Read More
Cisco to Spend $1 billion to Build World's Largest Global Intercloud

Cisco to Spend $1 billion to Build World's Largest Global Intercloud

Tuesday, March 25, 2014 by

Cisco has announced plans to build the world’s largest global Intercloud – a network of clouds – together with a set of partners. The Cisco global Intercloud is being architected for the Internet of Everything, with a distributed network and security architecture designed for high-value application workloads, real-time analytics, “near infinite” scalability and ful... Read More
Coverity Releases New Version of Enterprise Development Testing Platform

Coverity Releases New Version of Enterprise Development Testing Platform

Wednesday, January 08, 2014 by

Coverity has announced the availability of the Coverity Development Testing Platform 7.0, the next-generation of its software testing platform.The platform enables testing for cloud, mobile and web-based application development in Enterprise IT organizations. The new version of the Coverity Development Testing Platform is an enterprise-scale solution which combines... Read More
Increase Your App Rating, One Mobile Test at a Time

Increase Your App Rating, One Mobile Test at a Time

Wednesday, October 16, 2013 by

There’s nothing worse than taking the time to develop your mobile app for release, only to discover that it is not loading, has bugs, or even worse - crashes. The result of these failures in a mobile-centric, get-it-now world can be catastrophic to an enterprise mobile business. Developing mobile apps is extremely expensive and quality is often sidestepped due to the ... Read More
Mobile Helix Survey Shows Large Enterprise CIO’s Are Concerned With Incorporating Mobility

Mobile Helix Survey Shows Large Enterprise CIO’s Are Concerned With Incorporating Mobility

Saturday, August 10, 2013 by

Mobile Helix has released a survey by of 300 IT decision makers in the UK and US exploring challenges and barriers to mobilizing enterprise applications. The survey was conducted by the research company Vanson Bourne who polled 100 CIOs in the UK and 200 CIOs in the US representing companies with more than 1,000 employees. In the survey 87% of CIOs indicated employees ... Read More

Subscribe to App Developer Daily

Latest headlines delivered to you daily.