Universities fighting cybercrime with students
Thursday, April 24, 2025 by Richard Harris
Universities, one of the most popular targets for cybercriminals, are employing a new tool in the fight against cybercrime, their own students.
Over the past few years, universities and colleges around the U.S. have been increasingly hiring students and training them to become analysts in their security operations centers, known as SOCs. Students work alongside...
WWDC 2025 returns June 9
Monday, April 21, 2025 by Richard Harris
Apple recently announced it will host its annual Worldwide Developers Conference (WWDC) online from June 9 to 13, 2025. Developers and students will also have the opportunity to celebrate in person during a special event at Apple Park on June 9.
Available for free to all developers, WWDC25 will spotlight the latest advancements in Apple software. As part of Apple&rsq...
Security trade-offs and Xs vulnerabilities
Friday, March 21, 2025 by Richard Harris
The latest cyberattack on X raises an important question: Was this an external attack or a result of internal instability? While hacktivist group Dark Storm has claimed responsibility for the distributed denial-of-service (DDoS) attack, it is just as crucial to examine X’s own security posture, particularly in light of the drastic staffing cuts that followed Elon ...
Red Hat Device Edge deployed to space station
Thursday, March 13, 2025 by Richard Harris
Red Hat, Inc. and Axiom Space, will collaborate on Axiom Space’s Data Center Unit-1 (AxDCU-1), targeted to launch in spring 2025 to the International Space Station. Powered by Red Hat Device Edge, the data processing prototype will conduct tests on the space station and demonstrate initial Orbital Data Center (ODC) capabilities.
The prototype will te...
Brazil Games and ApexBrasil to participate in GDC 2025
Wednesday, March 12, 2025 by Richard Harris
The Brazil Games Export Program, a partnership between the Brazilian Game Companies Association (Abragames) and the Brazilian Trade and Investment Promotion Agency (ApexBrasil), is excited to announce its participation as an official exhibitor at the Game Developers Conference (GDC) 2025, taking place from March 19 to March 21 at the Moscone Center in San Francisco, Cal...
AI virtual escape room challenge
Friday, March 7, 2025 by Freeman Lightner
Pangea recently announced the general availability of AI Guard and Prompt Guard to secure AI, defending against threats like prompt injection and sensitive information disclosure. Alongside the company’s existing AI Access Control and AI Visibility products, Pangea now offers the industry’s most comprehensive suite of guardrails to secure AI applications.&nb...
AI coding security discussion with JFrog
Wednesday, February 19, 2025 by Richard Harris
Eyal Dyment, Vice President of Security Products at JFrog, shares his insights in this Q&A on the crucial considerations for developers and businesses when selecting an AI platform. With AI’s transformative role in coding and software development, Eyal addresses key security risks, the growing reliance on AI-powered technologies, and the steps developers can t...
Cybersecurity in 2025
Tuesday, February 4, 2025 by Richard Harris
Timothy Hollebeek shares his insights on the key cybersecurity trends shaping 2025, focusing on the evolving landscape of digital trust and identity. As quantum computing and AI continue to advance, they bring both groundbreaking innovations and new cybersecurity risks. The introduction of Google’s Willow chip signals a new era of quantum technology, accelerating ...
Cybersecurity supply chain risk management predictions for 2025
Thursday, January 16, 2025 by Austin Harris
DTS CEO and President Edward Tuorinsky shares his cybersecurity prediction for shaping the 2025 business landscape.
Cybersecurity in 2025 is like that party game where you whisper a phrase to the person next to you. One mistake is passed along to others, with funny outcomes. The stakes are higher, and the results are less amusing when data breaches or hacks travel al...
The rise of quantum computing in 2025
Tuesday, January 14, 2025 by Freeman Lightner
As we march towards the new year of 2025, it's incredible to see how many technologies once considered "emerging" are now on the brink of becoming mainstream.
2025: All About Movement
Raji Bezwada, CEO of JCS Solutions LLC, a premier provider of cybersecurity and technology services, examines 2025 trends and how government organizations can leverage ...
NetLib Security predictions 2025
Thursday, January 2, 2025 by Richard Harris
The leading prediction for 2025 will sound familiar: Generative AI directly affects your privacy rights. In many ways, this is a twist on the typical cybersecurity problem. Rather than a hacker or a bad actor breaking in to steal your data, we are being asked to hand our keys to the companies we often trust the most: Microsoft, Apple, Dropbox, and Google!
NetLib Secu...
Digital twins and genAI to transform app development in 2025
Wednesday, January 1, 2025 by Richard Harris
Dr. William Bain, founder and CEO of ScaleOut Software, a leader in operational intelligence through digital twins and scalable, in-memory computing, shares his predictions for the future of app development. Drawing from his 40-year career in parallel computing, he explores how the convergence of digital twins and generative AI will transform app development by deliveri...
API Security Perspectives 2025 report from Kong Inc
Monday, December 30, 2024 by Richard Harris
Kong Inc. released findings from their API Security Perspectives 2025: AI-Enhanced Threats and API Security Report which highlights today’s API security landscape and how new developments in AI will impact it. Most notably, 25% of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75% of respondents expressing serious concern a...
European enterprises rapidly deploying AI technology
Monday, December 30, 2024 by Russ Scritchfield
European enterprises are rapidly deploying artificial intelligence (AI) and automation technologies, with 92% of organizations having implemented these solutions over the last two years, according to new research from Digitate, a leading provider of AI-powered software for IT and business operations. However, the report, titled ‘The Race to Outpace: How AI and Aut...
AI solutions for US government
Monday, December 23, 2024 by Russ Scritchfield
Seekr and Carahsoft Technology Corp. have announced a partnership. Under the agreement, Carahsoft will serve as Seekr’s Master Government Aggregator, making the company’s reliable and transparent AI platform available to the Public Sector through Carahsoft’s reseller partners and NASA Solutions for Enterprise-Wide Procurement (SEWP) V, Information Tech...
AI fraud prevention solution launched
Tuesday, December 10, 2024 by Richard Harris
AppsFlyer announced the launch of an industry-leading AI enhancement layer on top of its Protect360 fraud prevention solution. Designed to address the growing challenges posed by increasingly sophisticated fraud tactics, the new AI layer leverages multiple machine learning models to deliver unmatched fraud detection and deterrence capabilities – offering customers...
Real time security software development from Symbiotic Security
Friday, November 22, 2024 by Richard Harris
Symbiotic Security launched a real-time security for software development that combines detection and remediation with just-in-time training – incorporating security testing and training directly into the development process without breaking developers’ workflows.
Backed with $3 million of seed funding from investors including Lerer Hippeau, Axeleo C...
Microsoft misconfigurations expose millions of records globally
Monday, November 18, 2024 by Freeman Lightner
In September 2024, significant data exposure was discovered within Microsoft Power Pages, a low-code SaaS platform, due to misconfigured access controls. The exposure, which potentially affected millions of individuals, highlights the risks associated with excessive permissions granted to the platform's "Anonymous" and "Authenticated" user roles....
Emerging features to consider for mobile app development
Wednesday, November 13, 2024 by Richard Harris
In an era where mobile applications are ubiquitous, with a staggering 8.93 million apps vying for attention across various app stores, distinguishing your app from the competition is paramount. While aesthetics undoubtedly play a role in user attraction, it is the functionality and features of an app that truly captivate and retain users. Whether you are embarking on yo...
Faster cyberthreat detection updates from Progress
Tuesday, October 29, 2024 by Austin Harris
Progress announced the latest release of Progress Flowmon, the network observability platform with AI-powered detection for cyberthreats, anomalies and fast access to actionable insights for greater network and application performance across hybrid cloud ecosystems. With today’s release, the Flowmon platform enhances IP search efficiency up to tenfold with in...
Developers threatened by DOJ proposals says Google
Monday, October 21, 2024 by Richard Harris
The U.S. Department of Justice (DOJ) has shared a broad outline of radical changes it may demand as part of its lawsuit regarding search distribution. This marks the beginning of a lengthy process, and Google plans to respond in detail to the DOJ's ultimate proposals as it prepares its case in court next year. However, concerns have arisen that the DOJ is signaling ...
Google AdSense updates revealed for new US state privacy laws
Friday, October 18, 2024 by Freeman Lightner
Google AdSense has released an important update addressing upcoming privacy laws in five US states. With new privacy regulations taking effect in Iowa, Delaware, New Jersey, Nebraska, and New Hampshire in early 2025, AdSense users and publishers will see key changes designed to ensure compliance and transparency.
Google AdSense updates announced for the new US state ...
Increasing cyber threats from artificial intelligence
Wednesday, October 9, 2024 by Freeman Lightner
The UK Cybersecurity M&A market has grown significantly over the past decade, with the deal volume trend line increasing, and the sector continuing to attract significant investment from Private Equity, alongside larger corporates consolidating emerging technologies to counter increasingly sophisticated threats.
The UK National Cyber Security Centre has...
Vulnerabilities in Apple products alert
Monday, September 30, 2024 by Richard Harris
CERT-In has recently issued Advisory CIAD-2024-0046, highlighting multiple high-severity vulnerabilities in Apple products. The vulnerabilities affect a wide range of Apple software, including iOS versions prior to 18, iPadOS versions prior to 18, macOS Sonoma versions prior to 14.7, macOS Ventura versions prior to 13.7, and the upcoming macOS Sequoia versions prior to ...
Quantum World Congress 2024 to take place next month
Wednesday, September 11, 2024 by Richard Harris
The third annual Quantum World Congress will take place from Monday, September 9th to Wednesday, September 11th, 2024, at Capital One Hall in Greater Washington. Quantum World Congress (QWC) is a premier global conference, exposition, and networking event that unites quantum technology visionaries, policymakers, researchers, business and investment leaders, educators, a...
SaaS report from Onymos reveals what tech leaders are worried about
Monday, September 9, 2024 by Brittany Hainzinger
Onymos, developer of solutions transforming Software-as-a-Service (SaaS) for software and application development, today announced the findings of its SaaS Disruption Report: Security & Data. It reveals that over three-quarters (78%) of technology leaders are concerned about security threats in Software-as-a-Service (SaaS) for application and software development.
...
Blockchain voting from Iranians Vote and Freedom Tool
Thursday, August 22, 2024 by Richard Harris
Rarimo is a privacy-first, zero-knowledge (ZK), protocol unlocking a new generation of social apps. In February, Rarimo launched Freedom Tool, an open-source software for citizen-run, anonymized elections and polls, which solves the long-standing technical challenge of enabling digital identity checks while also protecting citizens from tracking.
Iranians Vote ...
PhishFlagger anti-phishing email solution released
Monday, August 19, 2024 by Austin Harris
PhishFlagger, a human-compatible patented phishing solution, recently announced its new patented anti-phishing email solution. The solution validates emails through a unique identifier protocol, PhishCounter, which adds a sequential number in the subject line that identifies all outgoing and inbound emails. The easily implemented system also allows recipients to identif...
GenAI cybersecurity assistant lands from IBM
Friday, August 16, 2024 by Freeman Lightner
IBM recently announced the introduction of generative AI capabilities to its managed Threat Detection and Response Services utilized by IBM Consulting analysts to advance and streamline security operations for clients. Built on IBM's watsonx data and AI platform, the new IBM Consulting Cybersecurity Assistant is designed to accelerate and improve the identification,...
AWS introduces Mithra advanced threat intelligence neural network
Thursday, August 15, 2024 by Freeman Lightner
In a recent blog post from AWS, Amazon Chief Information Security Officer CJ Moses detailed the robust threat intelligence capabilities that safeguard AWS customers. Through tools like Mithra and MadPot, AWS collects and analyzes vast data, identifying and neutralizing threats with unparalleled accuracy and speed. AWS's proactive approach to sharing high-fidelity th...
Paris 2024 Olympic apps ask for dangerous permissions
Monday, August 12, 2024 by Austin Harris
As Paris city attracted a large number of sports tourists, the apps for the Olympic Games 2024 are tracking them, extracting private data, and peddling it to advertisers and big tech.
According to a report from the Cybernews research team, which selected 12 Android apps relevant to the Olympic Games attendees in Paris and tested their permissions, the apps designed t...
DevOps threats report released from GitProtect io
Monday, August 12, 2024 by Brittany Hainzinger
Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities,
and, as a result, data loss are the reality that DevSecOps teams have to face...even every
few days.
The State of DevOps threats report - teams affected every few days
GitProtect.io recently presented its studies on the most severe incidents affecting tools like GitHub...
Secure software development education report from the Linux Foundation
Wednesday, August 7, 2024 by Richard Harris
Linux Foundation Research and the Open Source Security Foundation (OpenSSF) are pleased to release a new report titled "Secure Software Development Education 2024 Survey: Understanding Current Needs." Based on a survey of nearly 400 software development professionals, the analysis explores the current state of secure software development. It underscores&n...
Geo-Fraud Detection mobile app by Appdome
Friday, August 2, 2024 by Freeman Lightner
Appdome announced it has enhanced its Geo-Fraud Detection service to include two new defenses: Geo-Location Fencing and Geo DeSync Attack Detection. Combined with other Geo-Compliance features available on the Appdome platform, mobile app developers and enterprises can eliminate location-based fraud, ensure geo-compliance and deliver location relevant use...
NPUs disrupting Nvidia AI dominance
Tuesday, July 23, 2024 by Brittany Hainzinger
The semiconductor market is projected to reach around $400 billion by 2030*, with AI semiconductors expected to constitute over 30% of this market, up from 20% today. AI has recently dominated headlines with the launch of ChatGPT, Claude, and a host of other GenAI platforms. This has prompted countless companies to examine how they can implement AI into their products, ...