cyber security

cyber security news search results

Developer news items we found relating to cyber security

35 results
Real-time-security-software-development-from-Symbiotic-Security

Real time security software development from Symbiotic Security


Friday, November 22, 2024 by

Symbiotic Security launched a real-time security for software development that combines detection and remediation with just-in-time training – incorporating security testing and training directly into the development process without breaking developers’ workflows. Backed with $3 million of seed funding from investors including Lerer Hippeau, Axeleo C...


Increasing-cyber-threats-from-artificial-intelligence

Increasing cyber threats from artificial intelligence


Wednesday, October 9, 2024 by

The UK Cybersecurity M&A market has grown significantly over the past decade, with the deal volume trend line increasing, and the sector continuing to attract significant investment from Private Equity, alongside larger corporates consolidating emerging technologies to counter increasingly sophisticated threats. The UK National Cyber Security Centre has...


Overcoming-burnout-in-software-QA-with-surfing

Overcoming burnout in software QA with surfing


Friday, June 14, 2024 by

Life has been changing and challenging as the future arises. Fear and anxiety is bringing risks to business owners, employees and to our families because of uncertainties of the future. With the technologies evolving rapidly with AI and the Cloud the Metaverse world becomes relevant in the near future. Life is supposed to be lived in happiness with a healthy lifestyle, ...


Recession-fears-may-cause-us-to-lower-our-defenses

Recession fears may cause us to lower our defenses


Friday, January 13, 2023 by

Adam Sandman, CEO and Founder of Inflectra discusses the trends in software quality engineering and cybersecurity for 2023. Mr. Sandman explains why quality engineering, DevOps, and security will no longer be seen as separate disciplines but as part of a larger whole. Finally, he will cover how risk management is critical in addressing this new integrated set of challen...


Cloud-and-Edge-computing-2022-predictions

Cloud and Edge computing 2022 predictions


Monday, January 17, 2022 by

Tobi Knaup is the CEO & Co-Founder at D2iQ, an independent Kubernetes company that 30% of the Fortune 50 companies and the U.S. Department of Defense rely on for their most mission-critical apps. Knaup shares his 2022 predictions about the shifting cloud landscape. The marriage of Cloud and Edge:  While both edge and cloud computing has been the subj...


SnykCon-2021-event-lineup

SnykCon 2021 event lineup


Friday, September 24, 2021 by

We're only a few weeks away from SnykCon 2021, Snyk's free annual developer conference that helps you learn how to build applications securely running October 5-7. We have a packed agenda full of expert talks, hands-on workshops, helpful demos, product roadmaps, opportunities to interact with some of the smartest speakers and leaders of developer security i...


Not-all-security-vulnerabilities-are-created-equal

Not all security vulnerabilities are created equal


Tuesday, May 25, 2021 by

Applications are the heart of employee and user productivity. There are billions of applications each with a specific function, value and, unfortunately, they also provide one of the easiest openings for cybercriminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the concept o...


Artificial-Intelligence-capabilities-in-Siren-10.3-release

Artificial Intelligence capabilities in Siren 10.3 release


Wednesday, August 21, 2019 by

Siren, an investigative intelligence platform released Siren 10.3. The latest version of Siren launches five new artificial intelligence (AI) capabilities: entity resolution, deep learning-based predictive analytics and alerting, deep learning-based times series anomaly detection, real-time topic clustering for textual corpuses and associative model technology...


Zeroday-vulnerability-announced-byMcAfee-at-Defcon

Zeroday vulnerability announced byMcAfee at Defcon


Monday, August 19, 2019 by

At DEFCON, McAfee has announced the discovery of a zero-day vulnerability in a commonly used Delta industrial control system. The vulnerability found in the Delta enteliBUS Manager could allow malicious actors complete control of the operating system, enabling remote manipulation of access control systems, boiler rooms, temperature control for critical systems and mo...


Acronis-gives-developers-early-access-to-new-cyber-platform

Acronis gives developers early access to new cyber platform


Monday, April 29, 2019 by

Acronis announced the opening of its core platforms, enabling broad, third-party developer access to the Acronis Cyber Platform to encourage expanded functionality and application integrations while expanding their opportunities in Acronis’ large ecosystem. The Acronis Cyber Platform, which is the foundation of the company’s existing services, features a ...


UN-commission-sets-cyber-security-regulations-for-Europe

UN commission sets cyber security regulations for Europe


Wednesday, January 9, 2019 by

The United Nations Economic Commission for Europe (UNECE) has confirmed it will integrate the widely used ISA/IEC 62443 series of standards into its forthcoming Common Regulatory Framework on Cybersecurity (CRF). The CRF will serve as an official UN policy position statement for Europe. At its recent annual meeting in Geneva, UNECE’s Working Party on Regulatory...


PCE-Supercluster-now-offered-by-Illumio

PCE Supercluster now offered by Illumio


Tuesday, January 8, 2019 by

Illumio, a cybersecurity company delivering micro-segmentation, announced full availability of PCE Supercluster designed for enterprise-scale real-time application dependency mapping and micro-segmentation deployments. PCE Supercluster, which is currently in use by some of the largest organizations in the world, makes Illumio the first company to offer a micro-segmentat...


Overcoming-IoT-security-threats-to-achieve-better-ROI

Overcoming IoT security threats to achieve better ROI


Monday, January 8, 2018 by

With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...


DevSecOps-is-important-and-here-is-why

DevSecOps is important and here is why


Friday, October 20, 2017 by

In the digital age, securing your development projects against malicious hackers can be quite the challenge. And when you take security and try to scale security to an enterprise, the challenge seems insurmountable. Evident by the frequent hacking incidents we see come through the news.Enter DevSecOps. DevSecOps is a methodology that interweaves the aspects of DevOps an...


Metadata-can-be-deadly-in-cyber-exploitation

Metadata can be deadly in cyber exploitation


Tuesday, July 18, 2017 by

When someone says "There's no cause for concern, it's only metadata" you can send them this:Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data po...


Protect-against-Wannacry-with-help-from-this-free-course

Protect against Wannacry with help from this free course


Friday, May 19, 2017 by

Alison has released a new course to teach people about the recent WannaCry global virus threat.The “WannaCry” computer virus infected thousands of computers worldwide this past weekend. (May 12th 2017). A “Trojan Horse” virus, it maliciously gains access to computer systems, locking down and making inaccessible to you and others your private information and data, then r...


A-DevOps-framework-for-federal-customers

A DevOps framework for federal customers


Wednesday, May 17, 2017 by

Last Thursday, President Trump signed an executive order designed to strengthen the cybersecurity of federal networks including moving all federal IT systems to the cloud. The executive order also calls for effective risk management, which includes requiring planning so that maintenance, improvements and modernization occur in a coordinated way and with appropriate regu...


The-Netflix-hack:-A-chat-about-securing-your-company

The Netflix hack: A chat about securing your company


Wednesday, May 10, 2017 by

As the digital transformation progresses onwards, the unfortunate side effects are becoming blatantly obvious in the news. It seems like every other day that some new big box company, political party, or individual has their information compromised. But even though only the few biggest companies get the real media attention, hundreds of millions of hacking attempts are ...


NoTrove-threat-is-delivering-millions-of-scam-ads

NoTrove threat is delivering millions of scam ads


Friday, April 28, 2017 by

Earlier this year, RiskIQ, a digital threat management company, reported an eight-fold increase in internet scam incidents that deny the $83 billion digital advertising industry millions of dollars. Now, researchers at RiskIQ have identified NoTrove, a newly discovered and major threat actor that is delivering millions of scam ads that threaten consumers and further und...


VPNs-will-not-protect-your-privacy-but-this-might

VPNs will not protect your privacy but this might


Monday, April 10, 2017 by

Editors note: Guest submission by Shaun Murphy, CEO of sndrCongress repealed FCC privacy regulations, set by Obama’s administration, that required Internet Service Provider’s (ISP’s) to obtain affirmative consent from customers before storing and using personal data for any purpose. This revelation has raised privacy concerns among consumers, and has sparked a debate of...


What-works-best-with-IoT-devices:-hardware-vs-software-presentation

What works best with IoT devices: hardware vs software presentation


Thursday, March 2, 2017 by

Icon Labs, a provider of security solutions for IoT and edge devices, has announced Icon Labs President Alan Grau has been selected to present at Embedded World Show Europe. Alan’s presentation will provide engineers, product managers and executives with an overview of the available security technologies for the IoT and IIoT, and a framework to start building secur...


IBM-Watson-for-cyber-security-has-cognitive-skills

IBM Watson for cyber security has cognitive skills


Monday, February 13, 2017 by

According to IBM research, security teams sift through more than 200,000 security events per day on average, leading to over 20,000 hours per year wasted chasing false positives. The need to introduce cognitive technologies into security operations centers will be critical to keep up with the anticipated doubling of security incidents over the next five years and increa...


The-data-security-money-pit

The data security money pit


Wednesday, January 25, 2017 by

93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...


Ransomware-facts-and-the-steps-to-prevent-it-on-your-device

Ransomware facts and the steps to prevent it on your device


Friday, December 30, 2016 by

As technology advances forward, so does its unintended consequences and evolution of bad people being able to exploit its weaknesses. Reports of one these exploits is sweeping across Europe, its name is ransomware. Ransomware is malware that allows hackers to take control of your computer and all its data, and then hold it hostage via encryption until a certain sum of m...


8-cyber-security-predictions-for-what

8 cyber security predictions for what's to come in AsiaPacific


Thursday, December 29, 2016 by

Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...


How-to-secure-your-online-accounts-from-cyber-attacks-in-2017

How to secure your online accounts from cyber attacks in 2017


Wednesday, December 21, 2016 by

In addition to ball drops and bubbly, the New Year offers an occasion to reflect and contemplate what's ahead in 2017. When Dec. 31 rolls around, many of us think about getting fit, saving more money and promising to take time to enjoy life. As the world becomes more and more connected – and our digital and offline lives become indistinguishable – we should also commit ...


Cyberbit

Cyberbit's SOC 3D automation updates and what you should know


Tuesday, December 20, 2016 by

Cyberbit just announced a new version of its SOC 3D automation and orchestration platform that increases productivity and effectiveness of the SOC and substantially reduces incident response times. The new platform integrates with all major SIEM and security solutions, automates SOC runbooks and workflows, and prioritizes incidents according to their business impact. It...


Tufin-extends-Check-Point-R80-security-management

Tufin extends Check Point R80 security management


Monday, December 19, 2016 by

Tufin, a network security policy orchestration solutions, has announced support for Check Point R80 Security Management, delivering end-to-end change automation and continuous policy compliance for joint customers across hybrid networks. With Tufin, Check Point users who are currently deploying or plan to deploy R80 Security Management can extend the benefits of consoli...


Humans-are-still-the-biggest-threat-to-cyber-security-report-shows

Humans are still the biggest threat to cyber security report shows


Saturday, December 17, 2016 by

Global technology company Nuix have released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behavior was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective ...


Paving-the-way-to-smarter-phone-security

Paving the way to smarter phone security


Wednesday, October 19, 2016 by

75 million Smartphone users admit that while they are afraid of cyber attacks, they have not set a password for their smartphones according to the latest TransUnion’s Cyber Security Survey. While at first glance, this seems completely alarming and the ramifications could result in identity theft, it is also not surprising as consumers are not technologists and they just...


IoT-Tech-Expo-descending-on-Silicon-Valley-next-week-(October-2021st)

IoT Tech Expo descending on Silicon Valley next week (October 2021st)


Friday, October 14, 2016 by

The IoT Tech Expo will be descending on Silicon Valley for 2 days (October 20-21st) of top-level content, discussion, case studies, live demos, workshops and plenty of networking opportunities. There will be 8 conference tracks, an exclusive Samsung Workshop, IoT hackathon and a vast exhibition including robotics, 3D pizza printers, drones, mind-reading tech and more! O...


DBmaestro-Adds-CyberArk-Integration-for-Privileged-Credentials

DBmaestro Adds CyberArk Integration for Privileged Credentials


Thursday, March 17, 2016 by

DBmaestro has announced that its DevOps for database solutions platform now offers a technology integration with the CyberArk Privileged Account Security Solution to offer security and compliance in DevOps environments by allowing DBmaestro to secure privileged access.DBmaestro’s TeamWork Oracle solution now integrates with CyberArk Application Identity Manager enabling...


New-Security-Report-Reveals-Increased-Threat-for-Mobile-Applications-

New Security Report Reveals Increased Threat for Mobile Applications


Sunday, February 21, 2016 by

According to a new cyber security report, mobile applications increasingly have become top security threats plaguing enterprises over the past year. The details are outlined in the recently published Hewlett Packard Enterprise (HPE) Cyber Risk Report 2016.As the company points out in the report, traditional network perimeters are disappearing allowing attack surfaces to...


Security-Startup-Provider-buguroo-Launches-New-Threat-Intelligence-Platform

Security Startup Provider buguroo Launches New Threat Intelligence Platform


Wednesday, February 17, 2016 by

Security provider buguroo, a U.S. startup and spinoff of Deloitte’s European Security Operations Center (SOC), is launching bugThreats, a threat intelligence platform (TIP) that looks outside the enterprise infrastructure and focuses on useful intelligence gathered where the compromised end users, and their stolen data, are.Focused on intelligence and not protection, bu...


New-iSheriff-Complete-Platform-Offers-a-Cloud-Based-Cyber-Security-Platform

New iSheriff Complete Platform Offers a Cloud Based Cyber Security Platform


Tuesday, February 2, 2016 by

Cloud security provider iSheriff has released iSheriff Complete, a cyber security platform designed to provide 360-degree protection of an organization’s devices and communication channels. iSheriff Complete is a cloud based platform that provides fully-integrated endpoint, Web and email security, delivered through a single Web-based management console with a single set...