Blockchain voting from Iranians Vote and Freedom Tool
Thursday, August 22, 2024 by Richard Harris
Rarimo is a privacy-first, zero-knowledge (ZK), protocol unlocking a new generation of social apps. In February, Rarimo launched Freedom Tool, an open-source software for citizen-run, anonymized elections and polls, which solves the long-standing technical challenge of enabling digital identity checks while also protecting citizens from tracking.
Iranians Vote ...
AWS introduces Mithra advanced threat intelligence neural network
Thursday, August 15, 2024 by Freeman Lightner
In a recent blog post from AWS, Amazon Chief Information Security Officer CJ Moses detailed the robust threat intelligence capabilities that safeguard AWS customers. Through tools like Mithra and MadPot, AWS collects and analyzes vast data, identifying and neutralizing threats with unparalleled accuracy and speed. AWS's proactive approach to sharing high-fidelity th...
DevOps threats report released from GitProtect io
Monday, August 12, 2024 by Brittany Hainzinger
Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities,
and, as a result, data loss are the reality that DevSecOps teams have to face...even every
few days.
The State of DevOps threats report - teams affected every few days
GitProtect.io recently presented its studies on the most severe incidents affecting tools like GitHub...
Secure software development education report from the Linux Foundation
Wednesday, August 7, 2024 by Richard Harris
Linux Foundation Research and the Open Source Security Foundation (OpenSSF) are pleased to release a new report titled "Secure Software Development Education 2024 Survey: Understanding Current Needs." Based on a survey of nearly 400 software development professionals, the analysis explores the current state of secure software development. It underscores&n...
Microsoft outage caused by software update from CrowdStrike
Tuesday, July 23, 2024 by Freeman Lightner
On July 18, a software update released by CrowdStrike, an independent cybersecurity firm, began to affect IT systems worldwide. Although Microsoft was not directly responsible for the incident, the impact on their ecosystem prompted the company to take immediate action to support their customers.
Microsoft outage caused by software update from CrowdStrike affect...
SaaS integration challenges explained by Prismatic
Wednesday, July 17, 2024 by Richard Harris
In this Q&A, we delve into the world of SaaS integrations with the CEO and co-founder of Prismatic Michael Zuercher. He shares valuable insights on the challenges companies face when implementing integrations, including security concerns, scaling difficulties, and the impact on core product development. Michael offers guidance on mitigating security risks and evalua...
Rise in cyberattacks is alarming folks
Friday, June 28, 2024 by Freeman Lightner
A recent study has uncovered a startling rise in cyberattacks from 2022 to 2023. Throughout 2023, the United States experienced an alarming 3,205 data breaches, marking a dramatic 78% surge from the 1,801 incidents reported in 2022.
The study conducted by data collection experts SOAX utilized data from the Identity Theft Resource Center on the number of data vi...
Cybersecurity performance optimization updates from Logpoint
Friday, February 2, 2024 by Freeman Lightner
Logpoint is releasing new capabilities to its Converged SIEM platform, enhancing threat detection and security operations and streamlining case management. Organizations can focus on essential security matters with the new capabilities by reducing workload, simplifying automation, and freeing up resources.
The new release delivers increased system stability and ...
Open source AI trends for 2024 according to Eclipse Foundation
Thursday, December 21, 2023 by Richard Harris
Each year I usually like to make a few predictions about where the software industry, open source, and Eclipse Foundation projects are headed. This year is going to be a little broader, as some large trends are going to impact us in ways that should be discussed and understood.
Government regulation will impact the software industry
The first trend is that for the...
Digital trust and security predictions from DigiCert
Tuesday, December 12, 2023 by Richard Harris
Mike Nelson, along with a team of experts at DigiCert looks back at the past year's security developments and makes some bold predictions of technology, identity, and digital trust. Here are DigiCert's top predictions:
Prediction 1: Senior executives will become more knowledgeable about post-quantum cryptography, and companies will accelerate their investment...
SBOM mandate to improve cybersecurity in the US
Friday, March 17, 2023 by Freeman Lightner
The number of cyberattacks waged against government sectors worldwide increased by 95% in the second half of 2022 compared to the same time period in 2021. (1) The global cost of cyberattacks is expected to grow exponentially from $8.44 trillion in 2022 to $23.84 trillion by 2027. (2) To support the nation’s critical infrastructure and Federal Government networks,...
Mitigating API attacks in 2022
Wednesday, January 5, 2022 by Richard Harris
Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...
Oxeye closes a $5.3 Million seed financing round
Thursday, November 4, 2021 by Brittany Hainzinger
Oxeye announced the closing of a $5.3 Million seed financing round led by MoreVC, a seed-stage venture capital fund in Israel. The latest round includes support from i3 Equity Partners, and other cybersecurity focused investors as the company prepares to protect the world’s most popular Web applications with next-generation cloud-native Application Security Testin...
Quantum computing in 2021
Monday, January 11, 2021 by Brittany Hainzinger
Quantum computing is likely to become practical soon, with the capability to break many encryption algorithms. Organizations should plan to upgrade to TLS 1.3 and quantum-safe cryptographic ciphers soon. Big Tech vendors Google and Microsoft will make updates to web browsers, but the server-side is for your organization to review and change. Kick off a Y2 K-li...
Data Privacy Day 2020 is here
Tuesday, January 28, 2020 by Richard Harris
Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure.
Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...
Package Feed module released by Flexera
Friday, August 16, 2019 by Austin Harris
Flexera, the software company that helps organizations realize technology’s power to accelerate their business, released the Package Feed Module, a new add-on module for its popular AdminStudio product.
AdminStudio saves users time and money preparing applications for deployment. AdminStudio is a tool used for creating custom deployment...
Warnings for aircraft cybersecurity
Thursday, August 1, 2019 by Brittany Hainzinger
The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...
Supporting citizen developers to speed digital transformation
Thursday, May 10, 2018 by Bill Kennedy
More than just a buzz word, companies across the globe are embracing digital transformation to create more efficient organizations not tied to traditional software applications and to forgo the messy paper trail. Digital transformation is dependent on many factors, but in particular, cloud-based technology is largely responsible for fueling the change. Simply put, overt...
Why developers run away from security updates
Monday, April 16, 2018 by Richard Harris
Veracode, Inc. has released new data that shines a light on the discrepancy between component security and hygiene. According to the research conducted with Vanson Bourne, only 52 percent of developers using commercial or open source components in their applications update those components when a new security vulnerability is announced. This highlights organizations’ la...
Oracle Autonomous Data Warehouse Cloud launched for GA
Sunday, April 1, 2018 by Richard Harris
Oracle has announced the availability of a new service based on its Autonomous Database named Oracle Autonomous Data Warehouse Cloud. Autonomous Data Warehouse Cloud, uses machine learning to deliver performance, security capabilities, and availability with no human intervention, at "half the cost of Amazon Web Services."Autonomous Data Warehouse Cloud delivers all of t...
This API api security solution to use AI
Thursday, February 1, 2018 by Richard Harris
To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...
Bitcoin exchange apps are risky claims new report
Monday, January 29, 2018 by Austin Harris
RiskIQ claims that the app stores are hosting 661 blacklisted Bitcoin apps which leave users open to hackers. They analyzed 18,408 apps across 20 app stores (mostly Android based), but including Apple, Google Play, SameAPK, and APKPlz.Fabian Libeau, EMEA VP of RiskIQ, warned anybody considering downloading such software to be extremely cautious and to research eac...
Overcoming IoT security threats to achieve better ROI
Monday, January 8, 2018 by Richard Harris
With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...
People are worried about internetconnected car security
Monday, December 4, 2017 by Austin Harris
Thales announced survey results revealing how respondents feel about the potential risks connected vehicles pose to their safety and the security of their personal information.Connected cars use mobile internet technology for safety systems and remote diagnostics (like “OnStar”), as well as controlling key functions via a smartphone, smartwatch, tablet or computer - ena...
Investing in websites instead of apps
Thursday, October 26, 2017 by Shioupyn Shen
Since the dawn of the first iPhone, Apple has been shaping the mobile narrative to suit its interests. Apple is able to maintain its dominance over the mobile market by brainwashing much of the technology industry into thinking that businesses need to spend hundreds of thousands of dollars creating and maintaining mobile apps to reach their target audiences. In fact, up...
Flexera issues warning about Cyberattacks
Tuesday, October 24, 2017 by Austin Harris
As 143 million Equifax consumers continue to pick up the pieces from stolen Social Security numbers, birth dates, drivers’ licenses, addresses and credit card numbers, Flexera has another warning - expect a long tail of incidents and breaches in the months and years to come.Flexera surveyed over 400 software suppliers, Internet of Things (IoT) manufacturers and in-house...
Report Indicates Data Breaches Continue Across Industries in Q2 2016
Friday, July 15, 2016 by Stuart Parkerson
Edgile has released its Q2CY16 GRC (Governance, Risk and Compliance) Content report that provides regulatory updates across a range of industries and examines significant data breaches in Q2. This report information about new laws and regulations affecting them, covering PCI DSS, GLBA, HIPAA and more, to protect against cyberattacks. The report indicates that Rans...
Prioritizing Proactivity in a Complex IT World
Friday, June 10, 2016 by Richard Harris
As a business’s technology infrastructure grows in complexity, IT teams struggle to take a proactive approach to infrastructure monitoring. Furthermore, the C-suite is placing more emphasis on IT’s responsibility to drive the business forward, adding additional pressure to the need to get ahead of performance problems or system outages before they occur. We sat dow...
Tips to Use Penetration Testing to Protect Your Business From Cyber Attacks
Thursday, May 12, 2016 by Joaquín Rodríguez Varela
Forty-seven percent of all breaches were caused by malicious or criminal attacks according to the most recent global data breach study released by the Ponemon Institute. Resolving an attack cost businesses an average of $170 per record, translating to an average total cost of $3.79 million for a data breach.Today’s cybercriminals are getting smarter at finding and breac...
Bomgar Platform Updates Secures Cloud Users Against Cyberattacks
Monday, September 14, 2015 by Richard Harris
Bomgar has released the latest version of its Privileged Access Management solution, which provides security professionals with the ability to control, monitor, and manage access to critical systems by privileged users and third-party vendors. Bomgar’s approach allows companies to enable controlled system access and defend against cyberattacks without requiring com...