Ransomware prevention platform ProLion sees large increase in revenue
Monday, October 24, 2022 by Freeman Lightner
ProLion has recorded an 80 percent increase in revenue for FY2022, driven by the addition of over 250 new customers worldwide. The uplift has been driven by demand for its ransomware protection solution CryptoSpike, which has soared as a result of the rise in ransomware and ransomware-as-a-service attacks.
The company also reported a renewal rate of 89...
NHS 11 attack: What we learned
Friday, August 19, 2022 by Freeman Lightner
Databarracks provides secure Disaster Recovery, Backup, and Business Continuity solutions in the UK. Chris Butler is the Head of Databarracks' Resilience and Continuity Consulting practice, a fellow of the Institute for Leadership and Management, a Member of the Business Continuity Institute, and a Certified Information Security Manager. But...
NET MAUI and the end of IE
Thursday, August 4, 2022 by Richard Harris
Earlier this year, Microsoft announced the general availability of .NET MAUI, enabling developers to build cross-platform applications from a single codebase, saving costs, and eliminating the need to maintain multiple codebases.
According to Microsoft, the primary goal of .NET MAUI is to enable developers "to deliver the best app experience as designed speciall...
ImmuniWeb Neuron web security scanning
Friday, June 10, 2022 by Richard Harris
ImmuniWeb has announced the launch of ImmuniWeb Neuron, a web application and API web security scanning solution that is based on the award-winning ImmuniWeb AI Platform available.
ImmuniWeb Neuron is designed to rapidly scan tens, hundreds, or even thousands of web applications and APIs for vulnerabilities, weaknesses, and misconfigurations. It c...
Fantom blockchain now supported on Pocket Network
Friday, May 13, 2022 by Brittany Hainzinger
Pocket Network announced it is adding support for Fantom Blockchain, the highly scalable blockchain platform for DeFi, crypto dApps, and enterprise applications.
Officially supporting Fantom within the Pocket Network enables developers to mint Fantom RPC endpoints for their applications directly from the Pocket Portal, enabling node runners too, for the first time, e...
The worlds most expensive NFT..so far
Thursday, April 7, 2022 by Brittany Hainzinger
Cyber Yachts has announced the world's most expensive NFT, a 120 meter (394 foot) megayacht named "Indah," priced at $400,000,000 USD (Indah can be purchased in Ethereum (ETH), Bitcoin (BTC), and Bitcoin Latinum (LTNM)). In addition to the NFT, the buyer will also receive the real-world, fully constructed 394-foot megayacht based on the same desi...
PKI Spotlight security solution launches
Wednesday, April 6, 2022 by Freeman Lightner
PKI Solutions announced the introduction of PKI Spotlight, an industry solution that provides real-time monitoring and alerting of the availability, configuration, and security of all organizations' PKI environments, all consolidated into one easy-to-use dashboard. PKI is a foundational technology for almost every identity and data encryption solution...
Files acquires ExaVault
Tuesday, March 29, 2022 by Richard Harris
Files.com, the Cloud-Native SaaS platform for File Integration and Automation, announced the acquisition of ExaVault, a major cloud file transfer vendor for SMB and mid-market businesses. The acquisition will generate the largest cloud-native files platform, with over 6,500 active business-to-business (B2B) customers.
Through its award-winning enterprise-grade file t...
NFT Super Bowl prop bets
Friday, February 11, 2022 by Richard Harris
For publicity, bookies often provide odds (prop bets) for featured Super Bowl events that are predetermined, such as the halftime show and commercials.
Cryptocurrency and NFT Super Bowl prop bets
Odds for these "entertainment" events surrounding the game are set by oddsmakers despite the understanding that small groups of people who work on these pr...
NFT racing game launches
Thursday, January 27, 2022 by Freeman Lightner
Supremacy Games has announced the Apex Kings NFT Racing game and released an action-packed trailer video.
Helsinki-based developer and publisher of mobile games and crypto games believe players will find true value in owning real brand cars in their forthcoming play and earn the game. The company has already secured the interest of numerous global car manufacturers a...
Software industry competition predictions
Tuesday, January 18, 2022 by Richard Harris
Daniel Herndon, Director of Cloud Services, and Linda Ding, Senior Director of Vertical Marketing Strategy from Laserfiche discuss their 2022 predictions about organizations adopting the cloud and low-code/no-code approaches, how businesses will build business resilience, why more organizations will commit to a digital-first approach, and much m...
Security compliance predictions for 2022
Tuesday, January 18, 2022 by Freeman Lightner
Edward Tuorinsky is the Managing Principal of DTS, a Service-Disabled Veteran-Owned Small Business, that provides information technology and management consulting services in the areas of program management, governance, strategic planning, organization advancement, business process efficiency, software development, system integration, and learning enhancement solutions....
Tap to mobile payment predictions
Tuesday, January 18, 2022 by Brittany Hainzinger
NMI has over 20 years of experience in the fintech software space, and NMI works with software developers to enable payments into existing tech stacks. Vijay Sondhi, CEO at NMI shares his 2022 predictions about software vendors, tap to mobile payments, how to maintain customers, and much more.
ISV and Tap to mobile payment predictions for 2022
In 2022, i...
Future of digital business in 2022
Tuesday, January 18, 2022 by Richard Harris
Subrah Iyar, CEO and Co-Founder, and Stanley Huang, CTO, and Co-founder from Moxtra share their 2022 predictions about digital interactions, why customer-centric business models will become the norm, how to combat the pain points of backend management, and much more.
Subrah Iyar, CEO, and Co-founder, Moxtra on the future of digital business:
Data privacy predictions from Ground Labs
Monday, January 17, 2022 by Freeman Lightner
As Ground Labs Co-Founder, Stephen Cavey leads a global team empowering enterprise partners to discover, manage and secure sensitive data across their organizations.
Stephen has deep security domain expertise with a focus on electronic payments and data security compliance. He is a frequent speaker at industry events such as PrivSec Global, and his expert analy...
Cloud and Edge computing 2022 predictions
Monday, January 17, 2022 by Brittany Hainzinger
Tobi Knaup is the CEO & Co-Founder at D2iQ, an independent Kubernetes company that 30% of the Fortune 50 companies and the U.S. Department of Defense rely on for their most mission-critical apps. Knaup shares his 2022 predictions about the shifting cloud landscape.
The marriage of Cloud and Edge:
While both edge and cloud computing has been the subj...
Cyber Yachts NFTs land
Friday, January 14, 2022 by Brittany Hainzinger
Bitcoin Latinum, the asset-backed cryptocurrency poised to revolutionize digital transactions has announced its acquisition of cyberyachts.com in partnership with three-time Grammy-nominated recording artist Quavo of Migos. Cyber Yachts will consist of NFT collections totaling 888 extraordinary yachts and will be exclusively offered on the UnicoNFT marketplace for ...
Voice Technology predictions for 2022
Friday, January 14, 2022 by Brittany Hainzinger
Joe Hagan, Chief Product Officer, is responsible for the LumenVox product portfolio. For more than 20 years, Joe has directed high-performing Product Management, Strategy, and Marketing teams across a diverse set of technology companies. Prior to joining LumenVox, Joe established the Product Management function and built out the marketing organization for CiBO Technolog...
Automated testing in 2022
Friday, January 14, 2022 by Richard Harris
Ajay Dawar, Alok Kulkarni, James Isaacs, and Linda Chen from Cyara discuss their 2022 predictions about real-time quality assurance, adopting automated testing, balancing employee experience and innovation, how to deliver innovative customer experiences, why AI won't displace humans for customer support, how enterprises can achieve digital transformation success, an...
Cloud and cyber asset management trends for 2022
Thursday, January 6, 2022 by Richard Harris
Companies have been racing to mature their technologies and pursue digital transformations in the last few years, as a way to gain or maintain competitive advantage and resilience. This has led to an emerging area of focus: cyber asset management. Organizations are now taking inventory of their IT infrastructure and prioritizing more agile cyber asset management process...
Mitigating API attacks in 2022
Wednesday, January 5, 2022 by Richard Harris
Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...
Software cyberattack predictions for 2022
Tuesday, January 4, 2022 by Richard Harris
Nigel Thorpe hails from a software development background and moved to the IT security industry with Entrust Technologies during the early days of PKI. His knowledge has benefited a number of security companies in the UK, Canada, and the USA, and he now serves as Technical Director at SecureAge Technology. With a wide range of experience in different business environmen...
Intelligence cloud lands from Azul
Monday, December 20, 2021 by Brittany Hainzinger
Azul announced Azul Intelligence Cloud, a new family of products that apply cloud resources to analyze and optimize Java fleets and provide actionable intelligence. Intelligence Cloud’s first offering, Cloud Native Compiler, brings elasticity to Java JIT compilation, enhancing the performance of Java applications in any computing environment, including microservic...
Oxeye closes a $5.3 Million seed financing round
Thursday, November 4, 2021 by Brittany Hainzinger
Oxeye announced the closing of a $5.3 Million seed financing round led by MoreVC, a seed-stage venture capital fund in Israel. The latest round includes support from i3 Equity Partners, and other cybersecurity focused investors as the company prepares to protect the world’s most popular Web applications with next-generation cloud-native Application Security Testin...
Offshore software developers risks and advantages
Thursday, October 28, 2021 by Vivien F. Peaden
The onset of COVID-19 has hastened CEOs’ prioritization of digital transformation to future-proof their organizations. This paradigm change is driving the IT outsourcing spend to improve operational agility, integrate new technologies, and achieve cost-savings and faster time-to-market.
Risks and advantages of using offshore software developers
The pandemic ...
SnykCon 2021 event lineup
Friday, September 24, 2021 by Randall Degges
We're only a few weeks away from SnykCon 2021, Snyk's free annual developer conference that helps you learn how to build applications securely running October 5-7. We have a packed agenda full of expert talks, hands-on workshops, helpful demos, product roadmaps, opportunities to interact with some of the smartest speakers and leaders of developer security i...
Faster customer integrations from HackerOne
Thursday, July 29, 2021 by Freeman Lightner
Tray.io has announced that HackerOne is using Tray Embedded to develop and deliver powerful customer integrations at scale. With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce the integration maintenance burden. Armed with seamless integrations, HackerOne customers can spend less time context-switching...
Six areas of focus for continuous security
Friday, April 16, 2021 by Jack Mannino
Applications are the heart of employee and user productivity. There are billions of applications each with a specific function and value and, unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the conce...
5 mistakes businesses make in application development
Friday, October 23, 2020 by Mayur S Shah
5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development
Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...
Outbrain highlights shift in trust between social media and consumers
Wednesday, September 2, 2020 by Brittany Hainzinger
Outbrain released new Cyber Weekend data highlighting the shift in trust between social media and consumers compared with the impact of quality news environments.
Although COVID-19 and the global recession have accelerated the shift of consumer buying to digital channels, data shows consumers' lack of trust toward the largest digital powerhouses in the world...
DevSecOps 7th annual Community Survey results
Wednesday, April 15, 2020 by Brittany Hainzinger
Sonatype published findings from its seventh annual DevSecOps Community Survey, based on responses from 5,045 software engineering professionals. The survey, developed and conducted in partnership with Carnegie Mellon’s Software Engineering Institute, CloudBees, DevOps Institute, DevOps.com, DevSecOps Days, NowSecure, Security Boulevard, Verica, and All Day DevOps...
To encrypt or not encrypt legacy devices no longer a choice
Thursday, March 19, 2020 by Freeman Lightner
Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...
Microsoft DART team tracks 77k active web shells
Thursday, February 6, 2020 by Brittany Hainzinger
In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers.
According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...
Data Privacy Day 2020 is here
Tuesday, January 28, 2020 by Richard Harris
Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure.
Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...
Artificial Intelligence capabilities in Siren 10.3 release
Wednesday, August 21, 2019 by Richard Harris
Siren, an investigative intelligence platform released Siren 10.3. The latest version of Siren launches five new artificial intelligence (AI) capabilities: entity resolution, deep learning-based predictive analytics and alerting, deep learning-based times series anomaly detection, real-time topic clustering for textual corpuses and associative model technology...