Cybersecurity AI trends in 2024 according to Edgio
Thursday, December 21, 2023 by Richard Harris
Looking ahead to 2024 and beyond, it is clear that the cybersecurity skills gap will only continue to widen. However, by leveraging AI tools and investing in the development of skilled cybersecurity professionals who can work effectively with these tools, organizations can better protect their networks and data from cyber threats and ensure they remain resilient in an i...
App server market size expected to reach 52B by 2030
Wednesday, November 1, 2023 by Richard Harris
The platform called an application server is typically used for cloud-based apps for mobile devices like tablets and smartphones. While allowing the right to access and the functionality of the corporate application, the application server serves as the host for the user's business logic.
The banking, financial services, and insurance (BFSI) industry are always d...
NFT marketplace and gallery to launch from Trend Innovations
Wednesday, April 26, 2023 by Brittany Hainzinger
Trend Innovations Holding Inc. has recently announced that they will combine two recent acquisitions to upgrade and launch a more robust version of the company's newly acquired InstantFAME platform. InstantFAME is a mobile and web application, which operates in the multi-billion-dollar digital artwork marketplace for artists to securely publish and sell their d...
NET MAUI and the end of IE
Thursday, August 4, 2022 by Richard Harris
Earlier this year, Microsoft announced the general availability of .NET MAUI, enabling developers to build cross-platform applications from a single codebase, saving costs, and eliminating the need to maintain multiple codebases.
According to Microsoft, the primary goal of .NET MAUI is to enable developers "to deliver the best app experience as designed speciall...
PKI Spotlight security solution launches
Wednesday, April 6, 2022 by Freeman Lightner
PKI Solutions announced the introduction of PKI Spotlight, an industry solution that provides real-time monitoring and alerting of the availability, configuration, and security of all organizations' PKI environments, all consolidated into one easy-to-use dashboard. PKI is a foundational technology for almost every identity and data encryption solution...
HackNotice announces threat intelligence platform
Friday, September 18, 2020 by Brittany Hainzinger
HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...
To encrypt or not encrypt legacy devices no longer a choice
Thursday, March 19, 2020 by Freeman Lightner
Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...
Experience Center worldwide launches from Microsoft
Monday, November 18, 2019 by Freeman Lightner
Microsoft has also reimagined the future of work by creating a blueprint for productivity, efficiency, accessibility, flexibility, and collaboration for organizations in the region.
In a world where we can expect more than 40 billion devices generating nearly 80 zettabytes (ZB) of data by 2025, organizations and industries will need to quickly adopt new tec...
Warnings for aircraft cybersecurity
Thursday, August 1, 2019 by Brittany Hainzinger
The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...
The most popular gaming platform, and why cloud gaming sucks
Friday, March 22, 2019 by Richard Harris
Gamers spend an average of 7 hours, 7 mins each week playing (up 19% from last year), and cloud is the next frontier for video games it seems, with major tech players like Microsoft and Google teasing their cloud gaming launches at GDC 19. But getting gamers on board with these new services will require developers to create interactive games that don’t frustr...
Code security gamification company nabs $3.5M in funding
Friday, September 14, 2018 by Christian Hargrave
Secure application development platform provider Secure Code Warrior announced that it has gained US $3.5 million in funding from two strategic venture capital firms. The financing was led by Washington DC-based Paladin Capital Group, with participation from Sydney-based AirTree Ventures. The initial funding round will allow the company to further expand its rapidly gro...
How the reddit security breach reminds us to be careful
Monday, August 6, 2018 by Christian Hargrave
reddit recently disclosed in their announcements feed of a security breach into their system which the hacker "managed to access some user data, including some current email addresses and a 2007 database backup containing old salted and hashed passwords." Include in the disclosed information was some reddit source code and some log files.
They went on to sa...
Autonomous vehicles and data collection talks coming August 78
Wednesday, August 1, 2018 by Christian Hargrave
Three no-cost discussion sessions will explore the growing importance of data capture, use and safe/reliable storage in vehicles and the autonomous transportation at the Flash Memory Summit August 7-8 at the Santa Clara Convention Center.
During the free sessions; engineers, executives, urban planners, government officials and transportation researchers will explore ...
Avoid mobile cybersecurity threats by checking the source
Thursday, July 5, 2018 by Sam Bakken
Earlier this month IT news organizations around the globe reported that Epic Games’ popular Fortnite game was being counterfeited and malicious actors were, in fact, lacing the imposter apps with malware.
We’re only human, and people unwittingly let their guard down in anticipation of something they're passionate about, or when they think they might b...
Questioning the future of privacy and the safety of personal identity
Thursday, June 28, 2018 by Richard Harris
While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR.
These findings and more are outlin...
This API api security solution to use AI
Thursday, February 1, 2018 by Richard Harris
To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...
The future of cybersecurity in machine learning
Sunday, July 30, 2017 by Richard Harris
McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...
Intel security becomes McAfee
Tuesday, April 4, 2017 by Christian Hargrave
McAfee has begun operating as a new standalone company. Built on the belief that “Together is Power,” the new McAfee will expand upon its leading security solutions platform to better enable customers to effectively identify and orchestrate responses to cyber-threats. The launch of McAfee marks the closing of the previously announced investment by TPG and Inte...
What works best with IoT devices: hardware vs software presentation
Thursday, March 2, 2017 by Richard Harris
Icon Labs, a provider of security solutions for IoT and edge devices, has announced Icon Labs President Alan Grau has been selected to present at Embedded World Show Europe. Alan’s presentation will provide engineers, product managers and executives with an overview of the available security technologies for the IoT and IIoT, and a framework to start building secur...
Security Intelligence Platform from Exabeam launched
Thursday, February 2, 2017 by Richard Harris
Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...
Humans are still the biggest threat to cyber security report shows
Saturday, December 17, 2016 by Christian Hargrave
Global technology company Nuix have released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behavior was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective ...
Rackspace Grants Early Access to Its Managed Security for Azure
Sunday, August 14, 2016 by Stuart Parkerson
Rackspace has announced early access to its Rackspace Managed Security for Microsoft Azure allowing those using Microsoft Azure, Amazon Web Services (AWS), Rackspace Dedicated Hosting and Rackspace Managed VMware Cloud to receive additional security protections provided by Rackspace Managed Security to detect and respond to security threats across cloud platforms.The pl...
Report Details Cybersecurity Implications for the Energy Sector
Thursday, April 21, 2016 by Stuart Parkerson
ScottMadden has released a report highlighting the future implications on cybersecurity for the energy sector. The report outlines the significant changes to the energy grid taking place in certain parts of the US which will result in significant exchanging of confidential information - information that has traditionally remained within the control of utilities. In...
Why Privileged Identity Management is Critical for Secure IT Outsourcing
Thursday, January 21, 2016 by Richard Harris
We visited with David McNeely, VP of Product Strategy at Centrify, to talk about why secure privileged identity management is critical as more of today’s businesses are outsourcing IT functions and relying on vendors to troubleshoot systems and applications. Centrify recently released a new privileged identity management solution supporting federated privileg...
App Developers: How to Protect Your Apps From Being Hacked in 2014
Wednesday, January 15, 2014 by Alan Kahn
With 2013 behind us we are left with the memory of a massive increase and change in cyber criminal behavior, as well as some foresight into 2014 and the things developers can do to protect applications from hacking.
As the Internet of Things (IoT) creates more situations where our daily lives, our governments, our utilities, our homes, and our businesses can be manag...