People and technology predictions from DTS
Friday, January 20, 2023 by Brittany Hainzinger
As we start the new year, most organizations have settled their workforce model as either in-person, hybrid, or remote and considered cybersecurity’s role in their operations. By and large, businesses have accepted that they must continually mature their security stance if they want to stay ahead of the next attack ploy. With that in mind, our predictions for the ...
Developers and brands must make mobile apps far more secure
Tuesday, January 17, 2023 by Christian Hargrave
The bad guys are still breaking digital windows and kicking down digital doors, so to speak, and will continue well into 2023 and beyond!
Consumers through experience or gut instinct will demand that their mobile app providers deliver key security features including trying to stop the increasingly prevalent "man-in-the-middle" attacks. The latest techn...
Recession fears may cause us to lower our defenses
Friday, January 13, 2023 by Richard Harris
Adam Sandman, CEO and Founder of Inflectra discusses the trends in software quality engineering and cybersecurity for 2023. Mr. Sandman explains why quality engineering, DevOps, and security will no longer be seen as separate disciplines but as part of a larger whole. Finally, he will cover how risk management is critical in addressing this new integrated set of challen...
How eSIM iPhone 14 could be a disaster for unprepared carriers
Monday, September 12, 2022 by Richard Harris
The news that Apple has launched an eSIM-only iPhone 14 model in the US is an eSIM turning point in the mobile carrier industry, essentially signaling the start of a new era of digital connectivity competition, says GlobalData.
According to the leading data and analytics company, the consequences are many and varied, as the eSIM-only smartphone model represents myria...
$3M in funding secured by W3 Storage Lab
Thursday, August 25, 2022 by Brittany Hainzinger
W3 Storage Lab has announced that it closed a pre-seed financing round of $3M. The round was co-led by Draper Dragon and OKX Blockdream Ventures with major participation from Lingfeng Capital and participation from other investors. Proceeds from the round will be used to grow its global team and fund operations.
W3 Storage Lab has co-developed a next-generation distr...
IP blocking warning when preventing click fraud
Friday, July 29, 2022 by Freeman Lightner
Click fraud is a massive problem, stealing tens of billions of dollars from advertisers every year. The fraudsters responsible for this crime include technically savvy website owners, transnational organized crime gangs, and even Nasdaq-listed multinationals.
The scam works like this: criminals create websites, and contact advertising networks like Microsoft Ads to r...
PKI Spotlight security solution launches
Wednesday, April 6, 2022 by Freeman Lightner
PKI Solutions announced the introduction of PKI Spotlight, an industry solution that provides real-time monitoring and alerting of the availability, configuration, and security of all organizations' PKI environments, all consolidated into one easy-to-use dashboard. PKI is a foundational technology for almost every identity and data encryption solution...
Security compliance predictions for 2022
Tuesday, January 18, 2022 by Freeman Lightner
Edward Tuorinsky is the Managing Principal of DTS, a Service-Disabled Veteran-Owned Small Business, that provides information technology and management consulting services in the areas of program management, governance, strategic planning, organization advancement, business process efficiency, software development, system integration, and learning enhancement solutions....
Data privacy predictions from Ground Labs
Monday, January 17, 2022 by Freeman Lightner
As Ground Labs Co-Founder, Stephen Cavey leads a global team empowering enterprise partners to discover, manage and secure sensitive data across their organizations.
Stephen has deep security domain expertise with a focus on electronic payments and data security compliance. He is a frequent speaker at industry events such as PrivSec Global, and his expert analy...
Cyber Yachts NFTs land
Friday, January 14, 2022 by Brittany Hainzinger
Bitcoin Latinum, the asset-backed cryptocurrency poised to revolutionize digital transactions has announced its acquisition of cyberyachts.com in partnership with three-time Grammy-nominated recording artist Quavo of Migos. Cyber Yachts will consist of NFT collections totaling 888 extraordinary yachts and will be exclusively offered on the UnicoNFT marketplace for ...
AI ML and IoT trends in 2022
Thursday, January 6, 2022 by Brittany Hainzinger
Rob Gibbon, Product Manager at Canonical, and Gabriel Aguiar Noury, Robotics Product Manager at Canonical, the publisher of Ubuntu discuss their predictions and AI/ML & IoT trends in 2022.
AI ML and IoT Prediction - Rob Gibbon:
Whilst the AI/ML adoption trend accelerates, shadow IT environments and ungoverned cloud run costs will increasingly become an unaccep...
NFT industry predictions for 2022
Tuesday, January 4, 2022 by Freeman Lightner
Justin Daniels, a shareholder in the Atlanta office of Baker Donelson, provides corporate advice to growth-oriented and middle-market domestic and international technology businesses. He is passionate about cybersecurity and considers it a strategic business enterprise risk. Daniels shares with us his 2022 predictions about the NFT industry.
My prediction for NFT&rsq...
Software cyberattack predictions for 2022
Tuesday, January 4, 2022 by Richard Harris
Nigel Thorpe hails from a software development background and moved to the IT security industry with Entrust Technologies during the early days of PKI. His knowledge has benefited a number of security companies in the UK, Canada, and the USA, and he now serves as Technical Director at SecureAge Technology. With a wide range of experience in different business environmen...
StorONE launches backup storage
Friday, November 19, 2021 by Brittany Hainzinger
The latest ransomware variants perform what is known as sleeper attacks, which avoid discovery by slowly infecting data. By the time an organization realizes it is dealing with a ransomware attack, a high percentage of data is encrypted. Modern backup storage needs to not only provide immutability of backup data it must do so, without impacting performance for pote...
Oxeye closes a $5.3 Million seed financing round
Thursday, November 4, 2021 by Brittany Hainzinger
Oxeye announced the closing of a $5.3 Million seed financing round led by MoreVC, a seed-stage venture capital fund in Israel. The latest round includes support from i3 Equity Partners, and other cybersecurity focused investors as the company prepares to protect the world’s most popular Web applications with next-generation cloud-native Application Security Testin...
Offshore software developers risks and advantages
Thursday, October 28, 2021 by Vivien F. Peaden
The onset of COVID-19 has hastened CEOs’ prioritization of digital transformation to future-proof their organizations. This paradigm change is driving the IT outsourcing spend to improve operational agility, integrate new technologies, and achieve cost-savings and faster time-to-market.
Risks and advantages of using offshore software developers
The pandemic ...
Promon partners with F5 to simplify mobile SDK integration
Wednesday, October 27, 2021 by Christian Hargrave
Promon, the Oslo-based app security company announced its partnership with F5, the multi-cloud application security and delivery company. This partnership now enables F5's customers to seamlessly implement the F5 Bot Defense Mobile SDK. The solution provides developers with the necessary tools to protect their applications from bot attacks utilizing Promon'...
Advanced digital fingerprinting capabilities from SEON
Monday, October 25, 2021 by Freeman Lightner
SEON, the fraud fighters, have unveiled modern digital device fingerprinting capabilities designed to identify and counter the latest internet and mobile fraud tactics used by sophisticated fraudsters and bots.
Advanced digital fingerprinting capabilities
Fraudsters increasingly use unusual device setups to speed their efforts. Device fingerprinting can ...
Protecting source code
Wednesday, October 6, 2021 by Nigel Thorpe
Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...
SnykCon 2021 event lineup
Friday, September 24, 2021 by Randall Degges
We're only a few weeks away from SnykCon 2021, Snyk's free annual developer conference that helps you learn how to build applications securely running October 5-7. We have a packed agenda full of expert talks, hands-on workshops, helpful demos, product roadmaps, opportunities to interact with some of the smartest speakers and leaders of developer security i...
Network visibility improves with Endace and Kemp Technologies
Tuesday, August 24, 2021 by Brittany Hainzinger
Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy.
Network visibility improves, helping teams reduce incident response times
The enhanced network flow metadata generation and intelligent traffic mon...
No code platform receives $33M in funding round
Wednesday, August 18, 2021 by Richard Harris
Betty Blocks, an enterprise no-code application development platform for citizen development, announced it has raised $33 million in funding. The round was led by European Private Equity and Venture Capital investor, SmartFin Capital. Also participating were existing investors Morse Investments and NIBC Bank.
Betty Blocks enables fusion teams – people from the ...
Faster customer integrations from HackerOne
Thursday, July 29, 2021 by Freeman Lightner
Tray.io has announced that HackerOne is using Tray Embedded to develop and deliver powerful customer integrations at scale. With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce the integration maintenance burden. Armed with seamless integrations, HackerOne customers can spend less time context-switching...
Business professionals see the cloud as a critical part of their jobs
Tuesday, June 22, 2021 by Brittany Hainzinger
Sixty-five percent of US business professionals now consider the cloud to be important or critical to carrying out their jobs, according to a survey by Ciena, conducted in partnership with research firm Dynata. However, it seems that home networks are falling short, as 40% plan to upgrade their residential broadband service to cope with the increased network demands of ...
Cyvatar raises 9 million for cybersecurity as a service model
Monday, June 21, 2021 by Brittany Hainzinger
Cyvatar announced that it has raised $9 million as part of its Series A financing to help scale and serve its rapidly growing customer base and continue to drive the adoption of its innovative cybersecurity-as-a-service (CSaaS) model.
Cyvatar raises 9 million for cybersecurity as a service model
Escalating cybersecurity breaches and the need to addr...
DevSecOps will go mainstream this year
Tuesday, January 26, 2021 by Richard Harris
Cybercriminals love Shadow Code exploits because hacking a commonly used library or service can place the malicious code on hundreds or thousands of websites. For example, the widely used jQuery JavaScript library has been breached multiple times, leading to digital skimming attacks broadly across the e-commerce sector. Adding jQuery to an application without ...
Quantum computing in 2021
Monday, January 11, 2021 by Brittany Hainzinger
Quantum computing is likely to become practical soon, with the capability to break many encryption algorithms. Organizations should plan to upgrade to TLS 1.3 and quantum-safe cryptographic ciphers soon. Big Tech vendors Google and Microsoft will make updates to web browsers, but the server-side is for your organization to review and change. Kick off a Y2 K-li...
5 mistakes businesses make in application development
Friday, October 23, 2020 by Mayur S Shah
5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development
Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...
HackNotice announces threat intelligence platform
Friday, September 18, 2020 by Brittany Hainzinger
HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...
New features from WSO2 API Manager
Friday, April 10, 2020 by Brittany Hainzinger
APIs are the core building blocks of digital businesses—assembling data, events and services from within the organization, throughout ecosystems, and across devices. This is driving demands to maximize adoption and reuse across internal and external portals and API marketplaces; ensure API security; and support modern architectures, including containers, microserv...
BlackBerry and ZTR partner to revolutionize the rail industry
Tuesday, April 7, 2020 by Freeman Lightner
ZTR and BlackBerry Limited have announced they are combining their proven technology expertise to offer railcar owners, operators, and suppliers a powerful new digital monitoring solution.
Recognizing there was an immediate industry need for a remote railcar monitoring solution that could withstand the rugged conditions of the railway, provide greater fleet...
Linux and LISH release census for open source security
Wednesday, February 19, 2020 by Brittany Hainzinger
The Linux Foundation’s Core Infrastructure Initiative (CII) and the Laboratory for Innovation Science at Harvard (LISH), announced the release of ‘Vulnerabilities in the Core,’ a Preliminary Report and Census II of Open Source Software.
This Census II analysis and report represent important steps towards understanding and addressing structural and s...
Adjust to launch Control Center as part of Automate Suite
Tuesday, February 18, 2020 by Freeman Lightner
Adjust announced the launch of its pioneering new product, Control Center, which will be part of the Adjust Automate suite. With its release, Adjust aims to dramatically simplify the process of mobile advertising management for today’s marketers.
Mobile has become the new undisputed king of digital, and eMarketer predicts marketers are poised to invest a record...
Justin Dolly becomes Chief Security Officer at Sauce Labs
Wednesday, February 12, 2020 by Brittany Hainzinger
Sauce Labs Inc. announced the appointment of Justin Dolly as chief security officer. A security industry veteran with more than 20 years of experience, Dolly will develop, implement, and enforce the company’s long-term security strategy, ensuring its customers have the highest level of protection to support their digital goals. The hiring of Dolly follows the rece...
Dangers of quantum hacking
Tuesday, February 11, 2020 by Richard Harris
Active Cypher has built a password-hacking quantum computer to demonstrate the dangers of quantum hacking.
Using $600 worth of hardware parts easily purchased online or at a local electronics store, Active Cypher’s founder and CTO, Dan Gleason, created a portable quantum computer dubbed QUBY (named after qubits, the basic unit of quantum information). QUBY runs...