cyberattacks

cyberattacks news search results

Developer news items we found relating to cyberattacks

19 results
Mitigating-API-attacks-in-2022

Mitigating API attacks in 2022


Wednesday, January 5, 2022 by

Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...


Oxeye-closes-a-$5.3-Million-seed-financing-round

Oxeye closes a $5.3 Million seed financing round


Thursday, November 4, 2021 by

Oxeye announced the closing of a $5.3 Million seed financing round led by MoreVC, a seed-stage venture capital fund in Israel. The latest round includes support from i3 Equity Partners, and other cybersecurity focused investors as the company prepares to protect the world’s most popular Web applications with next-generation cloud-native Application Security Testin...


Quantum-computing-in-2021

Quantum computing in 2021


Monday, January 11, 2021 by

Quantum computing is likely to become practical soon, with the capability to break many encryption algorithms. Organizations should plan to upgrade to TLS 1.3 and quantum-safe cryptographic ciphers soon. Big Tech vendors Google and Microsoft will make updates to web browsers, but the server-side is for your organization to review and change. Kick off a Y2 K-li...


Data-Privacy-Day-2020-is-here

Data Privacy Day 2020 is here


Tuesday, January 28, 2020 by

Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure. Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...


Package-Feed-module-released-by-Flexera

Package Feed module released by Flexera


Friday, August 16, 2019 by

Flexera, the software company that helps organizations realize technology’s power to accelerate their business, released the Package Feed Module, a new add-on module for its popular AdminStudio product. AdminStudio saves users time and money preparing applications for deployment. AdminStudio is a tool used for creating custom deployment...


Warnings-for-aircraft-cybersecurity

Warnings for aircraft cybersecurity


Thursday, August 1, 2019 by

The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...


Supporting-citizen-developers-to-speed-digital-transformation

Supporting citizen developers to speed digital transformation


Thursday, May 10, 2018 by

More than just a buzz word, companies across the globe are embracing digital transformation to create more efficient organizations not tied to traditional software applications and to forgo the messy paper trail. Digital transformation is dependent on many factors, but in particular, cloud-based technology is largely responsible for fueling the change. Simply put, overt...


Why-developers-run-away-from-security-updates

Why developers run away from security updates


Monday, April 16, 2018 by

Veracode, Inc. has released new data that shines a light on the discrepancy between component security and hygiene. According to the research conducted with Vanson Bourne, only 52 percent of developers using commercial or open source components in their applications update those components when a new security vulnerability is announced. This highlights organizations’ la...


Oracle-Autonomous-Data-Warehouse-Cloud-launched-for-GA

Oracle Autonomous Data Warehouse Cloud launched for GA


Sunday, April 1, 2018 by

Oracle has announced the availability of a new service based on its Autonomous Database named Oracle Autonomous Data Warehouse Cloud. Autonomous Data Warehouse Cloud, uses machine learning to deliver performance, security capabilities, and availability with no human intervention, at "half the cost of Amazon Web Services."Autonomous Data Warehouse Cloud delivers all of t...


This-API-api-security-solution-to-use-AI

This API api security solution to use AI


Thursday, February 1, 2018 by

To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...


Bitcoin-exchange-apps-are-risky-claims-new-report

Bitcoin exchange apps are risky claims new report


Monday, January 29, 2018 by

RiskIQ claims that the app stores are hosting 661 blacklisted Bitcoin apps which leave users open to hackers. They analyzed 18,408 apps across 20 app stores (mostly Android based),  but including Apple, Google Play, SameAPK, and APKPlz.Fabian Libeau, EMEA VP of RiskIQ, warned anybody considering downloading such software to be extremely cautious and to research eac...


Overcoming-IoT-security-threats-to-achieve-better-ROI

Overcoming IoT security threats to achieve better ROI


Monday, January 8, 2018 by

With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...


People-are-worried-about-internetconnected-car-security

People are worried about internetconnected car security


Monday, December 4, 2017 by

Thales announced survey results revealing how respondents feel about the potential risks connected vehicles pose to their safety and the security of their personal information.Connected cars use mobile internet technology for safety systems and remote diagnostics (like “OnStar”), as well as controlling key functions via a smartphone, smartwatch, tablet or computer - ena...


Investing-in-websites-instead-of-apps

Investing in websites instead of apps


Thursday, October 26, 2017 by

Since the dawn of the first iPhone, Apple has been shaping the mobile narrative to suit its interests. Apple is able to maintain its dominance over the mobile market by brainwashing much of the technology industry into thinking that businesses need to spend hundreds of thousands of dollars creating and maintaining mobile apps to reach their target audiences. In fact, up...


Flexera-issues-warning-about-Cyberattacks

Flexera issues warning about Cyberattacks


Tuesday, October 24, 2017 by

As 143 million Equifax consumers continue to pick up the pieces from stolen Social Security numbers, birth dates, drivers’ licenses, addresses and credit card numbers, Flexera has another warning - expect a long tail of incidents and breaches in the months and years to come.Flexera surveyed over 400 software suppliers, Internet of Things (IoT) manufacturers and in-house...


Report-Indicates-Data-Breaches-Continue-Across-Industries-in-Q2-2016

Report Indicates Data Breaches Continue Across Industries in Q2 2016


Friday, July 15, 2016 by

Edgile has released its Q2CY16 GRC (Governance, Risk and Compliance) Content report that provides regulatory updates across a range of industries and examines significant data breaches in Q2. This report information about new laws and regulations affecting them, covering PCI DSS, GLBA, HIPAA and more, to protect against cyberattacks.  The report indicates that Rans...


Prioritizing-Proactivity-in-a-Complex-IT-World

Prioritizing Proactivity in a Complex IT World


Friday, June 10, 2016 by

As a business’s technology infrastructure grows in complexity, IT teams struggle to take a proactive approach to infrastructure monitoring. Furthermore, the C-suite is placing more emphasis on IT’s responsibility to drive the business forward, adding additional pressure to the need to get ahead of performance problems or system outages before they occur. We sat dow...


Tips-to-Use-Penetration-Testing-to-Protect-Your-Business-From-Cyber-Attacks

Tips to Use Penetration Testing to Protect Your Business From Cyber Attacks


Thursday, May 12, 2016 by

Forty-seven percent of all breaches were caused by malicious or criminal attacks according to the most recent global data breach study released by the Ponemon Institute. Resolving an attack cost businesses an average of $170 per record, translating to an average total cost of $3.79 million for a data breach.Today’s cybercriminals are getting smarter at finding and breac...


Bomgar-Platform-Updates-Secures-Cloud-Users-Against-Cyberattacks

Bomgar Platform Updates Secures Cloud Users Against Cyberattacks


Monday, September 14, 2015 by

Bomgar has released the latest version of its Privileged Access Management solution, which provides security professionals with the ability to control, monitor, and manage access to critical systems by privileged users and third-party vendors. Bomgar’s approach allows companies to enable controlled system access and defend against cyberattacks without requiring com...