cyber

cyber news search results

Developer news items we found relating to cyber

35 results
NET-MAUI-and-the-end-of-IE

NET MAUI and the end of IE


Thursday, August 4, 2022 by

Earlier this year, Microsoft announced the general availability of .NET MAUI, enabling developers to build cross-platform applications from a single codebase, saving costs, and eliminating the need to maintain multiple codebases. According to Microsoft, the primary goal of .NET MAUI is to enable developers "to deliver the best app experience as designed speciall...


ImmuniWeb-Neuron-web-security-scanning

ImmuniWeb Neuron web security scanning


Friday, June 10, 2022 by

ImmuniWeb has announced the launch of ImmuniWeb Neuron, a web application and API web security scanning solution that is based on the award-winning ImmuniWeb AI Platform available. ImmuniWeb Neuron is designed to rapidly scan tens, hundreds, or even thousands of web applications and APIs for vulnerabilities, weaknesses, and misconfigurations. It c...


Fantom-blockchain-now-supported-on-Pocket-Network

Fantom blockchain now supported on Pocket Network


Friday, May 13, 2022 by

Pocket Network announced it is adding support for Fantom Blockchain, the highly scalable blockchain platform for DeFi, crypto dApps, and enterprise applications. Officially supporting Fantom within the Pocket Network enables developers to mint Fantom RPC endpoints for their applications directly from the Pocket Portal, enabling node runners too, for the first time, e...


The-worlds-most-expensive-NFT..so-far

The worlds most expensive NFT..so far


Thursday, April 7, 2022 by

Cyber Yachts has announced the world's most expensive NFT, a 120 meter (394 foot) megayacht named "Indah," priced at $400,000,000 USD (Indah can be purchased in Ethereum (ETH), Bitcoin (BTC), and Bitcoin Latinum (LTNM)). In addition to the NFT, the buyer will also receive the real-world, fully constructed 394-foot megayacht based on the same desi...


PKI-Spotlight-security-solution-launches

PKI Spotlight security solution launches


Wednesday, April 6, 2022 by

PKI Solutions announced the introduction of PKI Spotlight, an industry solution that provides real-time monitoring and alerting of the availability, configuration, and security of all organizations' PKI environments, all consolidated into one easy-to-use dashboard. PKI is a foundational technology for almost every identity and data encryption solution...


Files-acquires-ExaVault

Files acquires ExaVault


Tuesday, March 29, 2022 by

Files.com, the Cloud-Native SaaS platform for File Integration and Automation, announced the acquisition of ExaVault, a major cloud file transfer vendor for SMB and mid-market businesses. The acquisition will generate the largest cloud-native files platform, with over 6,500 active business-to-business (B2B) customers. Through its award-winning enterprise-grade file t...


NFT-Super-Bowl-prop-bets

NFT Super Bowl prop bets


Friday, February 11, 2022 by

For publicity, bookies often provide odds (prop bets) for featured Super Bowl events that are predetermined, such as the halftime show and commercials. Cryptocurrency and NFT Super Bowl prop bets Odds for these "entertainment" events surrounding the game are set by oddsmakers despite the understanding that small groups of people who work on these pr...


NFT-racing-game-launches

NFT racing game launches


Thursday, January 27, 2022 by

Supremacy Games has announced the Apex Kings NFT Racing game and released an action-packed trailer video. Helsinki-based developer and publisher of mobile games and crypto games believe players will find true value in owning real brand cars in their forthcoming play and earn the game. The company has already secured the interest of numerous global car manufacturers a...


Software-industry-competition-predictions

Software industry competition predictions


Tuesday, January 18, 2022 by

Daniel Herndon, Director of Cloud Services, and Linda Ding, Senior Director of Vertical Marketing Strategy from Laserfiche discuss their 2022 predictions about organizations adopting the cloud and low-code/no-code approaches, how businesses will build business resilience, why more organizations will commit to a digital-first approach, and much m...


Security-compliance-predictions-for-2022

Security compliance predictions for 2022


Tuesday, January 18, 2022 by

Edward Tuorinsky is the Managing Principal of DTS, a Service-Disabled Veteran-Owned Small Business, that provides information technology and management consulting services in the areas of program management, governance, strategic planning, organization advancement, business process efficiency, software development, system integration, and learning enhancement solutions....


Tap-to-mobile-payment-predictions

Tap to mobile payment predictions


Tuesday, January 18, 2022 by

NMI has over 20 years of experience in the fintech software space, and NMI works with software developers to enable payments into existing tech stacks. Vijay Sondhi, CEO at NMI shares his 2022 predictions about software vendors, tap to mobile payments, how to maintain customers, and much more. ISV and Tap to mobile payment predictions for 2022 In 2022, i...


Future-of-digital-business-in-2022

Future of digital business in 2022


Tuesday, January 18, 2022 by

Subrah Iyar, CEO and Co-Founder, and Stanley Huang, CTO, and Co-founder from Moxtra share their 2022 predictions about digital interactions, why customer-centric business models will become the norm, how to combat the pain points of backend management, and much more. Subrah Iyar, CEO, and Co-founder, Moxtra on the future of digital business: “...


Data-privacy-predictions-from-Ground-Labs

Data privacy predictions from Ground Labs


Monday, January 17, 2022 by

As Ground Labs Co-Founder, Stephen Cavey leads a global team empowering enterprise partners to discover, manage and secure sensitive data across their organizations.  Stephen has deep security domain expertise with a focus on electronic payments and data security compliance. He is a frequent speaker at industry events such as PrivSec Global, and his expert analy...


Cloud-and-Edge-computing-2022-predictions

Cloud and Edge computing 2022 predictions


Monday, January 17, 2022 by

Tobi Knaup is the CEO & Co-Founder at D2iQ, an independent Kubernetes company that 30% of the Fortune 50 companies and the U.S. Department of Defense rely on for their most mission-critical apps. Knaup shares his 2022 predictions about the shifting cloud landscape. The marriage of Cloud and Edge:  While both edge and cloud computing has been the subj...


Cyber-Yachts-NFTs-land-

Cyber Yachts NFTs land


Friday, January 14, 2022 by

Bitcoin Latinum, the asset-backed cryptocurrency poised to revolutionize digital transactions has announced its acquisition of cyberyachts.com in partnership with three-time Grammy-nominated recording artist Quavo of Migos. Cyber Yachts will consist of NFT collections totaling 888 extraordinary yachts and will be exclusively offered on the UnicoNFT marketplace for ...


Voice-Technology-predictions-for-2022

Voice Technology predictions for 2022


Friday, January 14, 2022 by

Joe Hagan, Chief Product Officer, is responsible for the LumenVox product portfolio. For more than 20 years, Joe has directed high-performing Product Management, Strategy, and Marketing teams across a diverse set of technology companies. Prior to joining LumenVox, Joe established the Product Management function and built out the marketing organization for CiBO Technolog...


Automated-testing-in-2022

Automated testing in 2022


Friday, January 14, 2022 by

Ajay Dawar, Alok Kulkarni, James Isaacs, and Linda Chen from Cyara discuss their 2022 predictions about real-time quality assurance, adopting automated testing, balancing employee experience and innovation, how to deliver innovative customer experiences, why AI won't displace humans for customer support, how enterprises can achieve digital transformation success, an...


Cloud-and-cyber-asset-management-trends-for-2022

Cloud and cyber asset management trends for 2022


Thursday, January 6, 2022 by

Companies have been racing to mature their technologies and pursue digital transformations in the last few years, as a way to gain or maintain competitive advantage and resilience. This has led to an emerging area of focus: cyber asset management. Organizations are now taking inventory of their IT infrastructure and prioritizing more agile cyber asset management process...


Mitigating-API-attacks-in-2022

Mitigating API attacks in 2022


Wednesday, January 5, 2022 by

Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...


Software-cyberattack-predictions-for-2022

Software cyberattack predictions for 2022


Tuesday, January 4, 2022 by

Nigel Thorpe hails from a software development background and moved to the IT security industry with Entrust Technologies during the early days of PKI. His knowledge has benefited a number of security companies in the UK, Canada, and the USA, and he now serves as Technical Director at SecureAge Technology. With a wide range of experience in different business environmen...


Intelligence-cloud-lands-from-Azul

Intelligence cloud lands from Azul


Monday, December 20, 2021 by

Azul announced Azul Intelligence Cloud, a new family of products that apply cloud resources to analyze and optimize Java fleets and provide actionable intelligence. Intelligence Cloud’s first offering, Cloud Native Compiler, brings elasticity to Java JIT compilation, enhancing the performance of Java applications in any computing environment, including microservic...


Oxeye-closes-a-$5.3-Million-seed-financing-round

Oxeye closes a $5.3 Million seed financing round


Thursday, November 4, 2021 by

Oxeye announced the closing of a $5.3 Million seed financing round led by MoreVC, a seed-stage venture capital fund in Israel. The latest round includes support from i3 Equity Partners, and other cybersecurity focused investors as the company prepares to protect the world’s most popular Web applications with next-generation cloud-native Application Security Testin...


Offshore-software-developers-risks-and-advantages

Offshore software developers risks and advantages


Thursday, October 28, 2021 by

The onset of COVID-19 has hastened CEOs’ prioritization of digital transformation to future-proof their organizations. This paradigm change is driving the IT outsourcing spend to improve operational agility, integrate new technologies, and achieve cost-savings and faster time-to-market. Risks and advantages of using offshore software developers The pandemic ...


SnykCon-2021-event-lineup

SnykCon 2021 event lineup


Friday, September 24, 2021 by

We're only a few weeks away from SnykCon 2021, Snyk's free annual developer conference that helps you learn how to build applications securely running October 5-7. We have a packed agenda full of expert talks, hands-on workshops, helpful demos, product roadmaps, opportunities to interact with some of the smartest speakers and leaders of developer security i...


Faster-customer-integrations-from-HackerOne

Faster customer integrations from HackerOne


Thursday, July 29, 2021 by

Tray.io has announced that HackerOne is using Tray Embedded to develop and deliver powerful customer integrations at scale. With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce the integration maintenance burden. Armed with seamless integrations, HackerOne customers can spend less time context-switching...


Six-areas-of-focus-for-continuous-security

Six areas of focus for continuous security


Friday, April 16, 2021 by

Applications are the heart of employee and user productivity. There are billions of applications each with a specific function and value and, unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the conce...


5-mistakes-businesses-make-in-application-development

5 mistakes businesses make in application development


Friday, October 23, 2020 by

5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...


Outbrain-highlights-shift-in-trust-between-social-media-and-consumers

Outbrain highlights shift in trust between social media and consumers


Wednesday, September 2, 2020 by

Outbrain released new Cyber Weekend data highlighting the shift in trust between social media and consumers compared with the impact of quality news environments. Although COVID-19 and the global recession have accelerated the shift of consumer buying to digital channels, data shows consumers' lack of trust toward the largest digital powerhouses in the world...


DevSecOps-7th-annual-Community-Survey-results

DevSecOps 7th annual Community Survey results


Wednesday, April 15, 2020 by

Sonatype published findings from its seventh annual DevSecOps Community Survey, based on responses from 5,045 software engineering professionals. The survey, developed and conducted in partnership with Carnegie Mellon’s Software Engineering Institute, CloudBees, DevOps Institute, DevOps.com, DevSecOps Days, NowSecure, Security Boulevard, Verica, and All Day DevOps...


To-encrypt-or-not-encrypt-legacy-devices-no-longer-a-choice

To encrypt or not encrypt legacy devices no longer a choice


Thursday, March 19, 2020 by

Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...


Microsoft-DART-team-tracks-77k-active-web-shells

Microsoft DART team tracks 77k active web shells


Thursday, February 6, 2020 by

In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers. According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...


Data-Privacy-Day-2020-is-here

Data Privacy Day 2020 is here


Tuesday, January 28, 2020 by

Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure. Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...


Artificial-Intelligence-capabilities-in-Siren-10.3-release

Artificial Intelligence capabilities in Siren 10.3 release


Wednesday, August 21, 2019 by

Siren, an investigative intelligence platform released Siren 10.3. The latest version of Siren launches five new artificial intelligence (AI) capabilities: entity resolution, deep learning-based predictive analytics and alerting, deep learning-based times series anomaly detection, real-time topic clustering for textual corpuses and associative model technology...


Zeroday-vulnerability-announced-byMcAfee-at-Defcon

Zeroday vulnerability announced byMcAfee at Defcon


Monday, August 19, 2019 by

At DEFCON, McAfee has announced the discovery of a zero-day vulnerability in a commonly used Delta industrial control system. The vulnerability found in the Delta enteliBUS Manager could allow malicious actors complete control of the operating system, enabling remote manipulation of access control systems, boiler rooms, temperature control for critical systems and mo...


Elastic-Stack-7.3-brings-maps-and-more

Elastic Stack 7.3 brings maps and more


Monday, August 5, 2019 by

Elastic has delivered Elastic Stack 7.3, which includes some very cool new features such as data frames, anomaly detection, elastic maps, and more. Check out all the highlights of the latest release below. Elastic Stack 7.3 highlights  Data frames: a new feature that allows users to pivot their Elasticsearch data on the fly to create live entity-centric in...