Memory module XR-DIMM gets aviation equipment certification
Friday, September 13, 2019 by Christian Hargrave
Apacer announces the release of the XR-DIMM. This rugged memory module is the first on the market to meet the exacting standards of the US RTCA DO-160G test, an aviation equipment certification that marks the XR-DIMM as resistant to high levels of vibration and therefore ideal for defense and aeronautical applications.
Since 2018, Apacer has been manufacturing DDR4 X...
IBM's z15 launches with Data Privacy Passports
Friday, September 13, 2019 by Freeman Lightner
Against a backdrop of global privacy breaches, with the cost of each security breach in the U.S. clocking in on avg $8.2 million, IBM launched "z15", the enterprise platform that delivers the ability to fully manage the privacy of customer data across hybrid and multi-cloud environments.
As part of the launch, IBM is announcing Data Privacy Passports, ...
Theatro joins with Cisco and Honeywell
Friday, August 30, 2019 by Christian Hargrave
Theatro announced that they have joined forces with Cisco and Honeywell to transform the future of retail, hospitality, manufacturing and other markets with large deskless workforces. The investments by these two market leaders will anchor the expansion of its platform interoperability and its market footprint.
Theatro’s voice-driven Intelligent Assistant platf...
Speakers and agenda for DevOps Enterprise Summit 2019
Wednesday, August 28, 2019 by Richard Harris
IT Revolution released its full conference agenda, and next round of business and technology leaders presenting at DevOps Enterprise Summit Las Vegas 2019. Hosted at The Cosmopolitan of Las Vegas from October 28-30, DevOps Enterprise Summit is an industry conference for business and technology leaders to learn how to develop and deploy software faster and to win in...
Artificial Intelligence capabilities in Siren 10.3 release
Wednesday, August 21, 2019 by Richard Harris
Siren, an investigative intelligence platform released Siren 10.3. The latest version of Siren launches five new artificial intelligence (AI) capabilities: entity resolution, deep learning-based predictive analytics and alerting, deep learning-based times series anomaly detection, real-time topic clustering for textual corpuses and associative model technology...
Zero-day vulnerability announced byMcAfee at Defcon
Monday, August 19, 2019 by Richard Harris
At DEFCON, McAfee has announced the discovery of a zero-day vulnerability in a commonly used Delta industrial control system.
The vulnerability found in the Delta enteliBUS Manager could allow malicious actors complete control of the operating system, enabling remote manipulation of access control systems, boiler rooms, temperature control for critical systems and mo...
Warnings for aircraft cybersecurity
Thursday, August 1, 2019 by Brittany Harris
The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...
AI-Powered protection for APIs
Thursday, June 20, 2019 by Richard Harris
The proliferation of APIs catalyzed by digital transformation initiatives is viewed as a virtual goldmine by hackers, who are hijacking tokens, cookies and keys, as well as targeting weaknesses in individual APIs. And all too often, static security controls fail to stop these attacks. Now, WSO2 and Ping Identity have partnered to protect APIs against cyber-attacks by co...
Anomaly detection by Instaclustr processes 19 billion events per day
Wednesday, June 19, 2019 by Brittany Harris
Instaclustr announced it has successfully created an anomaly detection application capable of processing and vetting real-time events at a uniquely massive scale – 19 billion events per day – by leveraging open source Apache Cassandra and Apache Kafka and Kubernetes container orchestration. Get the source code on github.
Anomaly detection is the identific...
Crowdsourced security and bug bounty adoption is spreading
Monday, May 20, 2019 by Richard Harris
There continues to be a fundamental imbalance in cybersecurity. Attackers are finding new ways to penetrate cyber defenses as targets proliferate to the cloud, mobile, and connected devices. Defenders need to take a proactive security approach.
The evolving threat landscape and the ever-widening security skills gap are giving rise to new approaches such as crowdsourc...
Acronis gives developers early access to new cyber platform
Monday, April 29, 2019 by Brittany Harris
Acronis announced the opening of its core platforms, enabling broad, third-party developer access to the Acronis Cyber Platform to encourage expanded functionality and application integrations while expanding their opportunities in Acronis’ large ecosystem.
The Acronis Cyber Platform, which is the foundation of the company’s existing services, features a ...
Ethereum hard forks
Friday, March 1, 2019 by Richard Harris
After a recent delay this past January, Ethereum’s Constantinople and Petersburg hard forks just hit at block number 7,280,000. The practice of forks sparks much debate in the industry and many are monitoring these imminent Ethereum hard forks with great anticipation, trepidation, and uncertainty.
But what are the implications of Constantinople and Petersb...
Nuweba emerges from stealth and opens beta program
Wednesday, February 20, 2019 by Christian Hargrave
Nuweba opened its beta program and announced a seed funding round of $4.8 million dollars led by Magma Partners and Target Global among other investors.
Serverless technology is the most exciting development since the rise of the cloud, freeing developers to focus their time and expertise on perfecting their applications and business logic without worrying about infr...
Develop on the Mainframe like any other cloud platform with Zowe
Monday, February 11, 2019 by Richard Harris
The Open Mainframe Project announced that Zowe, an open source software framework for the mainframe that strengthens integration with modern enterprise applications, is now production ready less than six months after launching. Any enterprise or solution developer can access the Zowe 1.0 source code or convenience build and incorporate it into their products or services...
How the US Government shutdown could effect your app
Friday, January 11, 2019 by Richard Harris
The impacts of the US Government being offline are obvious to the daily operations of the National parks, security agencies, and other federally funded offices. But it doesn't stop there. Techcrunch recently reported how this shutdown (close to the longest running in history), is affecting IPO ready companies, and Karen Hao, a reporter for MIT Technology Review rece...
UN commission sets cyber security regulations for Europe
Wednesday, January 9, 2019 by Christian Hargrave
The United Nations Economic Commission for Europe (UNECE) has confirmed it will integrate the widely used ISA/IEC 62443 series of standards into its forthcoming Common Regulatory Framework on Cybersecurity (CRF). The CRF will serve as an official UN policy position statement for Europe.
At its recent annual meeting in Geneva, UNECE’s Working Party on Regulatory...
PCE Supercluster now offered by Illumio
Tuesday, January 8, 2019 by Christian Hargrave
Illumio, a cybersecurity company delivering micro-segmentation, announced full availability of PCE Supercluster designed for enterprise-scale real-time application dependency mapping and micro-segmentation deployments. PCE Supercluster, which is currently in use by some of the largest organizations in the world, makes Illumio the first company to offer a micro-segmentat...
Gamification can transform your software security program
Tuesday, December 18, 2018 by Pieter Danhieux
No matter the organization, or indeed their individual circumstances, there is one problem I have identified time and time again over the course of my career: AppSec managers, CISOs, CIOs and cybersecurity experts all over the world are rarely able to positively engage their dev teams on security best practice and training. It’s a source of conflict between teams,...
Friday, December 14, 2018 by Christian Hargrave
Lightning Web Components ...
New APM platform uses AI and runs on Amazon EMR
Monday, December 10, 2018 by Richard Harris
Unravel Data, the application performance management (APM) platform designed for big data workloads, has introduced a full-stack, artificial intelligence (AI)-driven solution for big data workloads running on Amazon EMR. Amazon EMR is a cloud service that enables big data processing using Spark, Kafka, Hadoop, Impala, Hive, and other big data components across dynamical...
AimBrain joins the ForgeRock Trust Network with biometric solutions
Thursday, December 6, 2018 by Richard Harris
AimBrain announced its place on the ForgeRock Trust Network, which recently celebrated the traction made by the end of its first year. ForgeRock Trust Network is a global partner programme designed to provide organizations with access to a comprehensive range of authentication, risk and fraud management, identity proofing and identity enrichment solutions, all of which ...
AIOps and why IT should care
Thursday, November 29, 2018 by Bhanu Singh
For years, industry leaders have rightfully evangelized the massive benefits of digital transformation. Abandoning outdated legacy systems and processes in favor of cloud-enabled ones helps produce greater insights, lowers operating costs, and streamlines operations for faster time-to-market of new products or services and a better overall customer experience. Already, ...
AI for cybersecurity
Tuesday, November 27, 2018 by Richard Harris
As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...
Enterprise security report says mobile workers put data at risk
Wednesday, October 10, 2018 by Christian Hargrave
According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...
Top ten ICO scams that swindled over $687M
Friday, September 28, 2018 by Richard Harris
Initial Coin Offerings are one of the most tempting investment options for those hoping to profit from the ever-evolving world of cryptocurrency. However, the lack of regulation has allowed ICO investors to become targets of sneaky schemes.
Though ICOs have snowballed, with more than 750 being invested in during 2018 alone, the number of scams has also steadily risen...
National Coding Week is here
Monday, September 17, 2018 by Richard Harris
National Coding Week is upon us. That's why we thought it would be great to compile some quotes from industry experts to talk about what they think is most important about learning how to coding - a question seen through many different lenses.
“Today, software drives business. So, if an organization wants to excel, it needs to become a software-powered jugg...
Code security gamification company nabs $3.5M in funding
Friday, September 14, 2018 by Christian Hargrave
Secure application development platform provider Secure Code Warrior announced that it has gained US $3.5 million in funding from two strategic venture capital firms. The financing was led by Washington DC-based Paladin Capital Group, with participation from Sydney-based AirTree Ventures. The initial funding round will allow the company to further expand its rapidly gro...
Former Cisco GM joins Voxbone CaaS
Tuesday, September 11, 2018 by Christian Hargrave
Voxbone's mission has been bolstered by the addition of a new board member, Dr. Jens Meggers. Voxbone powers many enterprise cloud communications platforms with on-demand voice and messaging services via API. Meggers’ experience will be indispensable as Voxbone pushes further into the complex realm of enterprise infrastructures.
As former senior vice ...
Merged mining partnership between Bitmain and Elastos
Tuesday, August 28, 2018 by Christian Hargrave
Elastos (ELA) announced a merged mining partnership with Bitmain Technologies. The merged mining partnership means that for miners and future users of the smart web platform, it guarantees the security of the Bitcoin network by sharing its hashpower. Merged mining allows Bitcoin (BTC) and the ELA coin to be mined simultaneously and more efficiently, and conserves energy...
Stony Brook University gets $25M for new engineering program
Wednesday, August 22, 2018 by Christian Hargrave
Senate Majority Leader John Flanagan (2nd Senate District) and Chairman of the Senate’s Higher Education Committee Kenneth LaValle (1st Senate District) announced the award of $25 million in funding to Stony Brook University that will enable the university to begin the initial phases for developing a new engineering building on campus. The funding will enable Ston...
Information security event Black Hat USA celebrates 21 years
Tuesday, August 14, 2018 by Christian Hargrave
Black Hat has highlighted their 2018 event programming and new initiatives that will help make Black Hat USA 2018 its most successful show to date. The event welcomed nearly 19,000 of the most security-savvy professionals across the InfoSec spectrum - spanning academia, world-class researchers, and leaders in the public and private sectors. The event’s robust line...
How the reddit security breach reminds us to be careful
Monday, August 6, 2018 by Christian Hargrave
reddit recently disclosed in their announcements feed of a security breach into their system which the hacker "managed to access some user data, including some current email addresses and a 2007 database backup containing old salted and hashed passwords." Include in the disclosed information was some reddit source code and some log files.
They went on to sa...
Autonomous vehicles and data collection talks coming August 7-8
Wednesday, August 1, 2018 by Christian Hargrave
Three no-cost discussion sessions will explore the growing importance of data capture, use and safe/reliable storage in vehicles and the autonomous transportation at the Flash Memory Summit August 7-8 at the Santa Clara Convention Center.
During the free sessions; engineers, executives, urban planners, government officials and transportation researchers will explore ...
Acumos AI Challenge sponsors to give out $100k in prizes
Thursday, July 26, 2018 by Richard Harris
AT&T and Tech Mahindra have announced that they will be sponsoring the Acumos AI Challenge, an open source developer competition that seeks innovative artificial intelligence (AI) solutions.
Working with The Linux Foundation, the companies encourage students, developers and data scientists to submit their ground-breaking AI solutions for the chance to win prize m...
Avoid mobile cybersecurity threats by checking the source
Thursday, July 5, 2018 by Sam Bakken
Earlier this month IT news organizations around the globe reported that Epic Games’ popular Fortnite game was being counterfeited and malicious actors were, in fact, lacing the imposter apps with malware.
We’re only human, and people unwittingly let their guard down in anticipation of something they're passionate about, or when they think they might b...