Geo-Fraud Detection mobile app by Appdome
Friday, August 2, 2024 by Freeman Lightner
Appdome announced it has enhanced its Geo-Fraud Detection service to include two new defenses: Geo-Location Fencing and Geo DeSync Attack Detection. Combined with other Geo-Compliance features available on the Appdome platform, mobile app developers and enterprises can eliminate location-based fraud, ensure geo-compliance and deliver location relevant use...
Rise in cyberattacks is alarming folks
Friday, June 28, 2024 by Freeman Lightner
A recent study has uncovered a startling rise in cyberattacks from 2022 to 2023. Throughout 2023, the United States experienced an alarming 3,205 data breaches, marking a dramatic 78% surge from the 1,801 incidents reported in 2022.
The study conducted by data collection experts SOAX utilized data from the Identity Theft Resource Center on the number of data vi...
Open source AI trends for 2024 according to Eclipse Foundation
Thursday, December 21, 2023 by Richard Harris
Each year I usually like to make a few predictions about where the software industry, open source, and Eclipse Foundation projects are headed. This year is going to be a little broader, as some large trends are going to impact us in ways that should be discussed and understood.
Government regulation will impact the software industry
The first trend is that for the...
AI cybersecurity impacts according to NetLib Security
Monday, December 18, 2023 by Richard Harris
This is an easy call to make: NetLib Security predicts that Artificial Intelligence - Generative AI - will continue to heavily impact the world of cybersecurity, upping the game for defensive players, while giving cybercriminals more tools on the offensive side.
2023 was a year in which AI seemed suddenly to be everywhere. Although AI is not a new field, ChatGPT and ...
SBOM mandate to improve cybersecurity in the US
Friday, March 17, 2023 by Freeman Lightner
The number of cyberattacks waged against government sectors worldwide increased by 95% in the second half of 2022 compared to the same time period in 2021. (1) The global cost of cyberattacks is expected to grow exponentially from $8.44 trillion in 2022 to $23.84 trillion by 2027. (2) To support the nation’s critical infrastructure and Federal Government networks,...
Identity will hold the keys to the kingdom for cybercriminals
Wednesday, February 8, 2023 by Brittany Hainzinger
In 2023, identity will continue to hold the keys to the kingdom for cybercriminals. This is a continuation from 2022, with the Verizon Data Breach Investigations Report (DBIR) attributing 80% of basic web application attacks to the use of stolen credentials like passwords. Security incidents usually involve a variety of techniques, from social engineering to supply chai...
Recession fears may cause us to lower our defenses
Friday, January 13, 2023 by Richard Harris
Adam Sandman, CEO and Founder of Inflectra discusses the trends in software quality engineering and cybersecurity for 2023. Mr. Sandman explains why quality engineering, DevOps, and security will no longer be seen as separate disciplines but as part of a larger whole. Finally, he will cover how risk management is critical in addressing this new integrated set of challen...
Ransomware prevention platform ProLion sees large increase in revenue
Monday, October 24, 2022 by Freeman Lightner
ProLion has recorded an 80 percent increase in revenue for FY2022, driven by the addition of over 250 new customers worldwide. The uplift has been driven by demand for its ransomware protection solution CryptoSpike, which has soared as a result of the rise in ransomware and ransomware-as-a-service attacks.
The company also reported a renewal rate of 89...
NHS 11 attack: What we learned
Friday, August 19, 2022 by Freeman Lightner
Databarracks provides secure Disaster Recovery, Backup, and Business Continuity solutions in the UK. Chris Butler is the Head of Databarracks' Resilience and Continuity Consulting practice, a fellow of the Institute for Leadership and Management, a Member of the Business Continuity Institute, and a Certified Information Security Manager. But...
Mitigating API attacks in 2022
Wednesday, January 5, 2022 by Richard Harris
Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...
Software cyberattack predictions for 2022
Tuesday, January 4, 2022 by Richard Harris
Nigel Thorpe hails from a software development background and moved to the IT security industry with Entrust Technologies during the early days of PKI. His knowledge has benefited a number of security companies in the UK, Canada, and the USA, and he now serves as Technical Director at SecureAge Technology. With a wide range of experience in different business environmen...
5 mistakes businesses make in application development
Friday, October 23, 2020 by Mayur S Shah
5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development
Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...
Elastic Stack 7.3 brings maps and more
Monday, August 5, 2019 by Austin Harris
Elastic has delivered Elastic Stack 7.3, which includes some very cool new features such as data frames, anomaly detection, elastic maps, and more. Check out all the highlights of the latest release below.
Elastic Stack 7.3 highlights
Data frames: a new feature that allows users to pivot their Elasticsearch data on the fly to create live entity-centric in...
AIPowered protection for APIs
Thursday, June 20, 2019 by Richard Harris
The proliferation of APIs catalyzed by digital transformation initiatives is viewed as a virtual goldmine by hackers, who are hijacking tokens, cookies and keys, as well as targeting weaknesses in individual APIs. And all too often, static security controls fail to stop these attacks. Now, WSO2 and Ping Identity have partnered to protect APIs against cyber-attacks by co...
How the US Government shutdown could effect your app
Friday, January 11, 2019 by Richard Harris
The impacts of the US Government being offline are obvious to the daily operations of the National parks, security agencies, and other federally funded offices. But it doesn't stop there. Techcrunch recently reported how this shutdown (close to the longest running in history), is affecting IPO ready companies, and Karen Hao, a reporter for MIT Technology Review rece...
AI for cybersecurity
Tuesday, November 27, 2018 by Richard Harris
As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...
Sensor network data integrity gets help from a new blockchain solution
Wednesday, November 21, 2018 by Austin Harris
Sixgill, LLC unveiled its new breakthrough blockchain or distributed ledger-based solution for sensor network data integrity. Sixgill Integrity is a ledger-agnostic solution and is designed from the ground up to solve the fundamental need for an end-to-end, real-time sensor data authenticity system. With Integrity, organizations are assured that their emitted data, tran...
Zero latency apps gets closer to reality thanks to Redis Labs
Tuesday, November 20, 2018 by Richard Harris
Complex technologies like a self-driving car take in huge amounts of data from its environment, processing it and make appropriate decisions on how to respond within a few milliseconds. This is the kind of zero latency future Redis Labs is enabling, and they announced at Redis Day London, the latest release of Redis Enterprise with two key functionalities: Red...
IoT medical devices aren't as secure as you think
Monday, November 5, 2018 by Richard Harris
Zingbox released the report of its second annual Healthcare Security Survey. The survey was expanded this year to include not only IT/IS professionals, but also clinical and biomedical engineers who play critical roles in managing and securing connected medical devices.
The survey revealed a contradiction between the confidence that healthcare professionals have in t...
Blockchain IoT can work to your advantage
Friday, October 5, 2018 by Richard Harris
Why do the words Blockchain and IoT still sound terrifying to some businesses? Maybe it's because Blockchain terminology was made mainstream by Bitcoin, or perhaps it's that IoT sounds immediate security alarms.
According to IBM, using Blockchain in asset management, customs declarations, supply chain networks, commercial property leasing, and countless more ...
What American companies can learn from Europe's new GDPR laws
Wednesday, June 13, 2018 by Austin Harris
People around the world have recently started to receive tons of emails from companies updating their privacy policies. Naturally, many ask, why this is happening, and the ones with a deeper understanding of the process mutter a four-letter combination - GDPR. While an astounding part of the US Senate appears to be confused about the concept of Net Neutrality, Europe&rs...
Progressive web apps vs native apps: Showdown in 2018
Thursday, March 1, 2018 by Andrew Gazdecki
Apps have become an integral part of any brand's digital marketing efforts. You'd be hard-pressed to find a company that hasn't, at the very least, thought about developing an app. It would be even more difficult to find a company willing to deny the tremendous impact that an app can have on a brand's engagement and customer experience.
Given th...
NVIDIA urges congressional committee to embrace AI
Thursday, February 22, 2018 by Richard Harris
Artificial intelligence represents the biggest technological and economic shift in our lifetime, NVIDIA’s Ian Buck told a U.S. Congressional committee recently. In testimony before a hearing of the House of Representatives Subcommittee on Information Technology, Buck, vice president and general manager of our Tesla business, said the federal government should increase r...
This API api security solution to use AI
Thursday, February 1, 2018 by Richard Harris
To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...
How to protect IP communications from telecom fraud
Thursday, December 28, 2017 by William King
Software-based IP communications continue to grow in popularity because of the added reliability, reach and control they allow businesses to have over their telecom resources. However, as more developers continue to transfer enterprise communications from legacy telcos to cloud-based service providers, the threat of telecom fraud and cyber-attacks also rise. Accord...
Over 90 percent of healthcare IT networks have IoT devices connected
Thursday, July 20, 2017 by Austin Harris
ZingBox has released the results of its survey of IT decision-makers within the healthcare industry. The survey, fielded in early July, found that the majority of healthcare IT networks have IoT devices and that most IT departments believe that existing security solutions for laptops and servers can also protect connected medical devices.More than 90% of healthcare IT n...
Many fintech DevOps are not enforcing security
Tuesday, June 6, 2017 by Austin Harris
Venafi has announced the results of a study on the cryptographic security practices of DevOps teams in the financial services industry. Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is a particular issue for financial services organizations, whi...
The hottest skills needed in the freelance job market to get hired
Thursday, May 4, 2017 by Richard Harris
Upwork has released its newest quarterly index of the hottest skills in the U.S. freelance job market. The Upwork Skills Index ranks the site’s 20 fastest-growing skills and is part of a quarterly series that sheds light on new and emerging skills freelancers are providing. According to a recent report, nearly half (49%) of hiring managers use freelancers to access skil...
Ways you can protect yourself on the Internet
Thursday, February 23, 2017 by Richard Harris
Editors note: Guest submission by Anas Baig, a Digital Marketer & Security Enthusiast.Anyone can fall victim to hacking, and this fact is as evident as the shining sun. Every time you go online, you are, by default, vulnerable to cyber attacks. Hackers can steal your credit card info, social security number, username and passwords, or even render your PC completely ...
Optimizing your app server performance really matters
Friday, February 3, 2017 by Richard Harris
As people are becoming more and more likely to turn to software as a means for entertainment, computer utility solutions, and everything in between, the load on a healthy business's servers can quickly max out. This can cause some major issues, i.e. leaving your customers suffering from horrible load times or even completely dead in the water. That's why a intuitiv...
The data security money pit
Wednesday, January 25, 2017 by Richard Harris
93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...
Ransomware facts and the steps to prevent it on your device
Friday, December 30, 2016 by Richard Harris
As technology advances forward, so does its unintended consequences and evolution of bad people being able to exploit its weaknesses. Reports of one these exploits is sweeping across Europe, its name is ransomware. Ransomware is malware that allows hackers to take control of your computer and all its data, and then hold it hostage via encryption until a certain sum of m...
8 cyber security predictions for what's to come in AsiaPacific
Thursday, December 29, 2016 by Austin Harris
Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...
Metrological wants you to develop content that goes Over The Top
Wednesday, December 28, 2016 by Austin Harris
Metrological has announced a new method for operators to deploy premium Over-The-Top(OTT) content on Set-Top boxes (STBs). By using cloud-based frameworks and standardized key components, operators can streamline premium OTT integrations and speed up the time to market. Key features:- Simplified player abstraction- Security and provisioning- Code streamlining, reducing ...
How to secure your online accounts from cyber attacks in 2017
Wednesday, December 21, 2016 by Richard Harris
In addition to ball drops and bubbly, the New Year offers an occasion to reflect and contemplate what's ahead in 2017. When Dec. 31 rolls around, many of us think about getting fit, saving more money and promising to take time to enjoy life. As the world becomes more and more connected – and our digital and offline lives become indistinguishable – we should also commit ...