cryptographic

cryptographic news search results

Developer news items we found relating to cryptographic

34 results
A-world-with-no-passwords-and-how-FIDO2-can-help-make-it-happen

A world with no passwords and how FIDO2 can help make it happen


Monday, May 13, 2019 by

93.2 percent of the overall web browser market has embraced FIDO2: Google Chrome, Microsoft Edge, Apple Safari, Mozilla Firefox, and Opera. The FIDO Alliance is driven by hundreds of global tech leaders across enterprise, payments, telecom, government, and healthcare that have come together in support of the organization’s mission to reduce the world’s re...


Prevoty-offers-new-Autonomous-Application-Protection-capabilities

Prevoty offers new Autonomous Application Protection capabilities


Friday, March 1, 2019 by

Imperva announced the expansion of its application security offerings with two new Autonomous Application Protection capabilities. The update extends customers’ visibility into how applications behave and how users interact with sensitive information. With this expanded view across their business assets, customers will have deeper insights to understand and mit...


Migrating-old-Windows-2008-apps-over-to-Docker-just-got-easier

Migrating old Windows 2008 apps over to Docker just got easier


Tuesday, November 13, 2018 by

Docker has announced the Windows Server Application Migration Program that lets customers quickly and easily migrate and modernize legacy Windows applications, while driving continuous innovation across any application.   With a large percentage of Windows Server applications still running on Windows Server 2003 or 2008, companies that postpone migrating leg...


New-FPS-game-lets-your-earn-ERC20-tokens-while-you-play

New FPS game lets your earn ERC20 tokens while you play


Thursday, July 5, 2018 by

Game players can use WAR FIELD’s GOLDER (GLDR) - an ERC20-compliant, Ethereum-based cryptographic token - to stake on their character’s “life”. GOLDER are available exclusively at warfield.com during the company’s Token Sale/ICO, which starts June 28. Players then compete in deathmatch games. Simply put: the winners get GOLDER from ...


Blockchain-projects-will-be-quietly-abandoned-says-GlobalData

Blockchain projects will be quietly abandoned says GlobalData


Friday, June 1, 2018 by

Are you starting a new blockchain project but already thinking of calling it quits? New research from GlobalData says many of the early blockchain projects will either be quietly shelved in favor of more traditional approaches or they will evolve in a way which reduces their dependence on blockchain technology in 2018.GlobalData's Thematic Research report, ‘Blockchain -...


Consensus-algorithms-and-blockchain

Consensus algorithms and blockchain's future


Wednesday, May 16, 2018 by

The question of what’s next for cryptocurrencies and consensus algorithms is an interesting one - particularly lately, due in part to the negative press surrounding the Proof of Work (PoW) protocol and the amount of energy required to mine Bitcoin. However, the issue is not as clear-cut as it seems. There any many analysts, for example, who says the data used by Digicon...


Creating-an-app-on-Blockchain-technology-using-JavaScript

Creating an app on Blockchain technology using JavaScript


Thursday, February 15, 2018 by

As Blockchain technology comes into its own, it is becoming increasingly important for software developers and programmers to acquaint themselves with the benefits which blockchain can provide the architects and users of digital platforms and applications.Lisk is an application platform whose Software Development Kit allows users to code in JavaScript to build Blockchai...


Developing-on-blockchain-needs-to-become-easier

Developing on blockchain needs to become easier


Wednesday, January 10, 2018 by

As we enter 2018 and the blockchain industry continues to boom, widespread adoption of the technology behind bitcoin is on everyone's mind. However, some believe that as long as transactions occur on-chain, blockchain technology will never overcome the scalability problem that has kneecapped its pursuit of mainstream adoption. We recently sat with Emin Mahrt, COO o...


Exostar-launches-mobile-multifactor-authentication-solution

Exostar launches mobile multifactor authentication solution


Friday, December 15, 2017 by

Exostar has announced the general availability of a new option for multifactor authentication. Exostar Mobile ID is a smartphone or tablet app-based authenticator for which it has achieved Level 3 SAFE-BioPharma certification under the FICAM trust framework. The solution turns an individual’s mobile device into a secure hardware-based second factor for access control to...


Renesas-Electronics-expands-their-microcontroller-offerings

Renesas Electronics expands their microcontroller offerings


Thursday, November 16, 2017 by

Renesas Electronics Corporation announced the expansion of its RX65N/RX651 Group of microcontroller (MCU) lineup that addresses advanced security needs for connected devices operating in industrial automation, building automation, and smart metering systems. The expanded lineup features MCUs with integrated Trusted Secure IP, and enhanced, trusted flash functionality an...


NXP-releases-their-HomeKit-SDK-for-Apple-IoT

NXP releases their HomeKit SDK for Apple IoT


Tuesday, November 7, 2017 by

NXP Semiconductors announced that its Apple HomeKit Software Development Kit (SDK) offers full support for home automation applications using HomeKit, delivering exceptional performance, advanced security, while supporting all connectivity options, including BLE, Wi-Fi, Ethernet, and remote access over iCloud.HomeKit is a framework in iOS that lets accessories connect s...


Open-Source-Summit-North-America-announces-additional-keynote-speakers

Open Source Summit North America announces additional keynote speakers


Friday, July 14, 2017 by

The Linux Foundation has announced additional keynote speakers for Open Source Summit North America, taking place September 11-14 in Los Angeles, CA.The Linux Foundation Open Source Summit is the premier open source technical conference in North America, gathering 2,000 developers, operators and community leadership professionals to collaborate, share information and l...


Many-fintech-DevOps-are-not-enforcing-security

Many fintech DevOps are not enforcing security


Tuesday, June 6, 2017 by

Venafi has announced the results of a study on the cryptographic security practices of DevOps teams in the financial services industry. Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is a particular issue for financial services organizations, whi...


JavaScript-apps-get-Arxan-application-protection-solution

JavaScript apps get Arxan application protection solution


Friday, February 17, 2017 by

Arxan Technologies, a provider of application protection and management solutions, has announced Arxan Application Protection for JavaScript, a new offering that provides leading protection for JavaScript-based applications, including hybrid iOS and Android apps, in addition to web apps. The comprehensive solution is designed to prevent brand damage, financial loss, IP ...


Remitano-Bitcoin-P2P-leaves-out-the-banks-to-help-secure-your-money

Remitano Bitcoin P2P leaves out the banks to help secure your money


Monday, January 2, 2017 by

As banks and nations slowly move towards a cashless society, people everywhere have began to buy "third party" currencies that exist outside of national monetary systems. The fear being caused from the bank's future control of the monetary policies and possible installation of negative interest rates. Not to mention the tracking and storing of all financial transac...


Floodgate-Key-Manager-launches-to-help-secure-credentialing-services-to-devices

Floodgate Key Manager launches to help secure credentialing services to devices


Monday, November 7, 2016 by

Icon Labs, a leading provider of security solutions for IoT and edge devices, has announced the availability of Floodgate Key Manager. This new product enables OEMs and device developers to easily add secure credentialing services to their devices. The embedded key management solution provides integration with multiple certificate authorities, including Verizon’s certif...


What-the-mobile-AR-phenomenon-has-taught-us-about-security

What the mobile AR phenomenon has taught us about security


Thursday, October 13, 2016 by

The extraordinary success of Pokémon Go has been surprising, even in the rapidly changing paradigm of the mobile application space. The game, which allows users to hunt down and capture virtual monsters, uses Augmented Reality (AR) technology to display the creatures in real world locations such as parks, homes, and offices.Pokémon Go has already broken five Guinness Wo...


New-iOS-and-macOS-Updates:-What-VPN-Users-Need-to-Know

New iOS and macOS Updates: What VPN Users Need to Know


Wednesday, October 5, 2016 by

Apple rolled out its newest operating system updates – iOS 10 and macOS Sierra. The new updates brought about a lot of exciting new features and upgrades. Apple’s mobile and Mac software is now more integrated: for example, Siri assistant has arrived on the computer. Users are also excited about the Universal Clipboard that allows to choose photos from iPhone and direct...


Discussing-Android-OS-in-the-Enterprise-With-Zebra-Technologies

Discussing Android OS in the Enterprise With Zebra Technologies


Tuesday, September 6, 2016 by

We recently spoke with Bruce Willins, engineering fellow at Zebra Technologies, to discuss the versatility and power of the Android OS and how it’s used at an enterprise level in retail, manufacturing, supply chain and more.   ADM: Who is Zebra Technologies and what does the company do? Willins: At Zebra, we make businesses as smart and connected...


Qualcomm-Releases-New-Snapdragon-Wear-1100-Processor-for-Smart-Wearables

Qualcomm Releases New Snapdragon Wear 1100 Processor for Smart Wearables


Wednesday, June 8, 2016 by

Qualcomm has released a new Qualcomm Snapdragon Wear 1100 processor for the targeted-purpose wearables segments such as connected kid and elderly watches, fitness trackers, smart headsets, and wearable accessories. The Snapdragon Wear 1100 processor joins the Snapdragon Wear 2100 processor, which is designed for multi-purpose wearables.Snapdragon Wear 1100 provides the ...


Lanner

Lanner's New FW-7526 Desktop Network Appliance Offers Entry-Level UTM


Friday, June 3, 2016 by

Lanner has introduced its newest desktop network appliance in response to the growing trend in cloud computing to replace physical CPE (Customer Premises Equipment) with virtualized, software-defined CPE in order to establish flexible branch-to-cloud connections. This trend is seeing companies implement virtual branch networks by focusing on virtualized network services...


JFrog-Xray-Offers-Visibility-for-Container-Images,-Software-Packages-and-Binary-Artifacts

JFrog Xray Offers Visibility for Container Images, Software Packages and Binary Artifacts


Wednesday, May 25, 2016 by

JFrog has announced the launch of JFrog Xray, which provides visibility into the contents of software components. JFrog Xray is a universal impact analysis product, to provide companies with understanding about their container images, software packages and binary artifacts, providing insight into the huge volume and variety of components that development teams share in ...


Five-Common-Mobile-App-Security-Vulnerabilities---And-How-to-Fix-Them

Five Common Mobile App Security Vulnerabilities - And How to Fix Them


Saturday, April 30, 2016 by

Mobile app security leaves much to be desired. That was the conclusion of a 2016 Hewlett Packard Enterprise (HPE) study which found that a staggering 96 percent of 36,000 mobile apps failed at least one of 10 privacy checks. Three years ago, a similar HPE study found that 97 percent of 2,000 apps reviewed held insecure private information. As mobile app usage conti...


New-Whitewood-Release-Enhances-Random-Number-Accessibility-for-Crypto-Security

New Whitewood Release Enhances Random Number Accessibility for Crypto Security


Thursday, March 3, 2016 by

Whitewood has released netRandom, a new suite of products for creating high-quality, true random numbers that are accessed across the traditional datacenter, cloud, mobile and embedded systems.The new product addresses a potential weakness in today’s crypto-security systems by giving enterprise security teams, cloud/hosting providers and security product vendors the opp...


Telit-IoT-AppZone-Development-Environment-Now-Supports-Android

Telit IoT AppZone Development Environment Now Supports Android


Friday, February 19, 2016 by

Telit has released the next new generation of its Telit IoT AppZone application development environment (ADE), which now supports the Android open source framework. The expanded environment will allow developers to leverage their experience with Android, using the same tools and APIs in a framework they are familiar with, reducing IoT development time and effort. T...


86-Percent-of-PHP-Based-Applications-Contain-at-Least-One-Cross-Site-Scripting-Vulnerability

86 Percent of PHP Based Applications Contain at Least One Cross-Site Scripting Vulnerability


Tuesday, December 8, 2015 by

Veracode is reporting that its analytics show 86 percent of PHP-based applications contain at least one Cross-Site Scripting (XSS) vulnerability and 56 percent have at least one SQL injection (SQLi) when initially assessed by Veracode. The analysis is part of a supplement to Veracode’s “2015 State of Software Security: Focus on Application Development”, which is a repor...


ARM-mbed-OS-for-the-IoT-Now-In-Beta

ARM mbed OS for the IoT Now In Beta


Tuesday, September 22, 2015 by

ARM has announced the ARM mbed OS is now available for beta testing. In addition to the OS release, ARM has announced the mbed Device Connector Beta, mbed Client Beta, mbed Device Server 2.5, and mbed TLS 2.1.0 are scheduled to be released over the next few weeks. Here is a full rundown of the releases:mbed OSThe beta mbed OS is an open source embedded operating sy...


HP-Releases-New-Data-Security-Options

HP Releases New Data Security Options


Thursday, September 17, 2015 by

HP has introduced several new enterprise data security options delivered through the data-centric security offerings of HP Atalla and HP Security Voltage. These new updates address PCI compliance, data de-identification and collaboration security.HP Atalla now offers integration of Adallom with HP ArcSight through the Cloud Access Security protection platform. This inte...


Akana

Akana's New API Platform Offers Multi-Datacenter Geographic Distribution


Wednesday, September 16, 2015 by

Akana has introduced a new API Platform that offers multi-datacenter geographic distribution and scale addressing the distribution and scaling requirements of large enterprises, avoiding the pitfalls faced by standalone API gateway instances.Akana’s platform shares configuration and operational data for auditing data, SLA processing, and quota management. This real-time...


Silicon-Labs-Introduces-Integrated-Pre-certified-IoT-Bluetooth-Smart-Module

Silicon Labs Introduces Integrated Pre certified IoT Bluetooth Smart Module


Monday, August 24, 2015 by

Silicon Labs has introduced a fully integrated, pre-certified Bluetooth Smart module solution to give developers a fast path to low-power wireless connectivity for the IoT. The new BGM111 module is the first in a family of advanced Blue Gecko modules from Silicon Labs delivering integration, flexibility, energy efficiency and toolchain support with an easy migratio...


Freescale-Releases-Smallest-Single-Chip-Module-for-IoT-Development

Freescale Releases Smallest Single Chip Module for IoT Development


Saturday, July 4, 2015 by

Freescale Semiconductor introduced one of the world’s smallest single chip modules (SCM) for the Internet of Things (IoT). As the IoT requires more processing horsepower to be packed into ever smaller spaces, Freescale’s new SCM line of products can integrate hundreds of components including processors, memory, power management and RF parts, which would otherwise be dep...


SecureRF-Offers-Next-Generation-of-Asymmetric-Security-for-the-Internet-of-Things

SecureRF Offers Next Generation of Asymmetric Security for the Internet of Things


Tuesday, May 12, 2015 by

SecureRF offers a family of Algebraic Eraser public key cryptography cores that offer increased performance while requiring low power and a small footprint. The AE Core is a Diffie-Hellman like authentication protocol that utilizes SecureRF’s Algebraic Eraser algorithm, a linear-in-time method, to enable higher levels of security to low resource devices without altering...


Game-Publisher-Reveals-Secrets-to-the-Localization-Process-for-Shadowgate-ReImagined

Game Publisher Reveals Secrets to the Localization Process for Shadowgate ReImagined


Wednesday, April 1, 2015 by

Zojoi, a developer of adventure games, and indie games partner Reverb Triple XP have have announced the Linux version of Shadowgate is now available as well as localized versions in French, Italian, German, and Spanish languages.“We had a pretty big demand from players to launch both the Linux version and additional languages for Shadowgate,” said David Marsh, co-founde...


Bitcoin-And-Digital-Money-Challenge-The-Global-Economic-Order

Bitcoin And Digital Money Challenge The Global Economic Order


Wednesday, December 10, 2014 by

Bitcoin and Digital Money are challenging today’s Global Economic Order. Financial journalists Paul Vigna and Michael J. Casey have written in THE AGE OF CRYPTOCURRENCY: How Bitcoin and Digital Money are Challenging the Global Economic Order. THE AGE OF CRYPTOCURRENCY demystifies virtual currency.Bitcoin is a digital currency and peer-to-peer (P2P) payment net...