cybersecurity

cybersecurity news search results

Developer news items we found relating to cybersecurity

35 results
Linux-and-LISH-release-census-for-open-source-security

Linux and LISH release census for open source security


Wednesday, February 19, 2020 by

The Linux Foundation’s Core Infrastructure Initiative (CII) and the Laboratory for Innovation Science at Harvard (LISH), announced the release of ‘Vulnerabilities in the Core,’ a Preliminary Report and Census II of Open Source Software. This Census II analysis and report represent important steps towards understanding and addressing structural and s...


Adjust-to-launch-Control-Center-as-part-of-Automate-Suite

Adjust to launch Control Center as part of Automate Suite


Tuesday, February 18, 2020 by

Adjust announced the launch of its pioneering new product, Control Center, which will be part of the Adjust Automate suite. With its release, Adjust aims to dramatically simplify the process of mobile advertising management for today’s marketers. Mobile has become the new undisputed king of digital, and eMarketer predicts marketers are poised to invest a record...


Justin-Dolly-becomes-Chief-Security-Officer-at-Sauce-Labs

Justin Dolly becomes Chief Security Officer at Sauce Labs


Wednesday, February 12, 2020 by

Sauce Labs Inc. announced the appointment of Justin Dolly as chief security officer. A security industry veteran with more than 20 years of experience, Dolly will develop, implement, and enforce the company’s long-term security strategy, ensuring its customers have the highest level of protection to support their digital goals. The hiring of Dolly follows the rece...


Dangers-of-quantum-hacking

Dangers of quantum hacking


Tuesday, February 11, 2020 by

Active Cypher has built a password-hacking quantum computer to demonstrate the dangers of quantum hacking. Using $600 worth of hardware parts easily purchased online or at a local electronics store, Active Cypher’s founder and CTO, Dan Gleason, created a portable quantum computer dubbed QUBY (named after qubits, the basic unit of quantum information). QUBY runs...


Bill-Kiriakis-And-Silvia-Buermann-get-new-roles-with-Adjust

Bill Kiriakis And Silvia Buermann get new roles with Adjust


Tuesday, January 28, 2020 by

Adjust announced two new senior appointments to its global sales teams. Bill Kiriakis joins as SVP Global Sales, and Silvia Buermann as VP Global Sales Operations. They each bring over 20 years of sales experience in digital marketing analytics from leadership positions at several big tech companies including Adobe, Coremetrics, Omniture, Oracle, and Salesforce. An e...


Data-Privacy-Day-2020-is-here

Data Privacy Day 2020 is here


Tuesday, January 28, 2020 by

Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure. Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...


Global-gaming-industry-in-2019

Global gaming industry in 2019


Thursday, January 9, 2020 by

Mobile is on track to dominate the estimated $152 billion global gaming industry in 2019, accounting for 45% of the market. To help app developers and advertisers take advantage of this meteoric growth, Adjust, the industry leader in mobile measurement, fraud prevention, and cybersecurity, has become the first mobile measurement partner in Unity Technologies’ Veri...


Threat-of-quantum-computing-hackathon-to-award-$100,000

Threat of quantum computing hackathon to award $100,000


Monday, November 25, 2019 by

Communique Laboratory Inc. launched its quantum hackathon tackling the threat of quantum computing. Cybersecurity companies, computer science students and hackers have begun challenging the Company’s ‘quantum-safe’ encryption in a $100,000 hackathon.  The Company hosted an innovation celebration event with technology presentations from industry...


API-Manager-3-from-WSO2-released

API Manager 3 from WSO2 released


Monday, November 18, 2019 by

APIs are the essential building blocks of digital businesses—assembling data, events and services from within the organization, throughout ecosystems, and across devices. This is driving new demands for organizations to create and monetize APIs and API products; maximize adoption and reuse across internal and external portals and API marketplaces; and ensure API s...


Experience-Center-worldwide-launches-from-Microsoft

Experience Center worldwide launches from Microsoft


Monday, November 18, 2019 by

Microsoft has also reimagined the future of work by creating a blueprint for productivity, efficiency, accessibility, flexibility, and collaboration for organizations in the region. In a world where we can expect more than 40 billion devices generating nearly 80 zettabytes (ZB) of data by 2025, organizations and industries will need to quickly adopt new tec...


FTC-cracks-down-on-comprehensive-data-security-for-Utah-company

FTC cracks down on comprehensive data security for Utah company


Thursday, November 14, 2019 by

A Utah-based technology company has agreed to implement a comprehensive data security program to settle Federal Trade Commission allegations that the company failed to put in place reasonable security safeguards, which allowed a hacker to access the personal information of a million consumers. InfoTrax Systems, L.C., provides back-end operation services to multi-leve...


Memory-module-XRDIMM-gets-aviation-equipment-certification

Memory module XRDIMM gets aviation equipment certification


Friday, September 13, 2019 by

Apacer announces the release of the XR-DIMM. This rugged memory module is the first on the market to meet the exacting standards of the US RTCA DO-160G test, an aviation equipment certification that marks the XR-DIMM as resistant to high levels of vibration and therefore ideal for defense and aeronautical applications. Since 2018, Apacer has been manufacturing DDR4 X...


IBM

IBM's z15 launches with Data Privacy Passports


Friday, September 13, 2019 by

Against a backdrop of global privacy breaches, with the cost of each security breach in the U.S. clocking in on avg $8.2 million, IBM launched "z15", the enterprise platform that delivers the ability to fully manage the privacy of customer data across hybrid and multi-cloud environments. As part of the launch, IBM is announcing Data Privacy Passports, ...


Theatro-joins-with-Cisco-and-Honeywell

Theatro joins with Cisco and Honeywell


Friday, August 30, 2019 by

Theatro announced that they have joined forces with Cisco and Honeywell to transform the future of retail, hospitality, manufacturing and other markets with large deskless workforces. The investments by these two market leaders will anchor the expansion of its platform interoperability and its market footprint. Theatro’s voice-driven Intelligent Assistant platf...


Speakers-and-agenda-for-DevOps-Enterprise-Summit-2019-

Speakers and agenda for DevOps Enterprise Summit 2019


Wednesday, August 28, 2019 by

IT Revolution released its full conference agenda, and next round of business and technology leaders presenting at DevOps Enterprise Summit Las Vegas 2019. Hosted at The Cosmopolitan of Las Vegas from October 28-30, DevOps Enterprise Summit is an industry conference for business and technology leaders to learn how to develop and deploy software faster and to win in...


Artificial-Intelligence-capabilities-in-Siren-10.3-release

Artificial Intelligence capabilities in Siren 10.3 release


Wednesday, August 21, 2019 by

Siren, an investigative intelligence platform released Siren 10.3. The latest version of Siren launches five new artificial intelligence (AI) capabilities: entity resolution, deep learning-based predictive analytics and alerting, deep learning-based times series anomaly detection, real-time topic clustering for textual corpuses and associative model technology...


Zeroday-vulnerability-announced-byMcAfee-at-Defcon

Zeroday vulnerability announced byMcAfee at Defcon


Monday, August 19, 2019 by

At DEFCON, McAfee has announced the discovery of a zero-day vulnerability in a commonly used Delta industrial control system. The vulnerability found in the Delta enteliBUS Manager could allow malicious actors complete control of the operating system, enabling remote manipulation of access control systems, boiler rooms, temperature control for critical systems and mo...


Warnings-for-aircraft-cybersecurity

Warnings for aircraft cybersecurity


Thursday, August 1, 2019 by

The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...


AIPowered-protection-for-APIs

AIPowered protection for APIs


Thursday, June 20, 2019 by

The proliferation of APIs catalyzed by digital transformation initiatives is viewed as a virtual goldmine by hackers, who are hijacking tokens, cookies and keys, as well as targeting weaknesses in individual APIs. And all too often, static security controls fail to stop these attacks. Now, WSO2 and Ping Identity have partnered to protect APIs against cyber-attacks by co...


Anomaly-detection-by-Instaclustr-processes-19-billion-events-per-day

Anomaly detection by Instaclustr processes 19 billion events per day


Wednesday, June 19, 2019 by

Instaclustr announced it has successfully created an anomaly detection application capable of processing and vetting real-time events at a uniquely massive scale – 19 billion events per day – by leveraging open source Apache Cassandra and Apache Kafka and Kubernetes container orchestration. Get the source code on github. Anomaly detection is the identific...


Crowdsourced-security-and-bug-bounty-adoption-is-spreading

Crowdsourced security and bug bounty adoption is spreading


Monday, May 20, 2019 by

There continues to be a fundamental imbalance in cybersecurity. Attackers are finding new ways to penetrate cyber defenses as targets proliferate to the cloud, mobile, and connected devices. Defenders need to take a proactive security approach. The evolving threat landscape and the ever-widening security skills gap are giving rise to new approaches such as crowdsourc...


Acronis-gives-developers-early-access-to-new-cyber-platform

Acronis gives developers early access to new cyber platform


Monday, April 29, 2019 by

Acronis announced the opening of its core platforms, enabling broad, third-party developer access to the Acronis Cyber Platform to encourage expanded functionality and application integrations while expanding their opportunities in Acronis’ large ecosystem. The Acronis Cyber Platform, which is the foundation of the company’s existing services, features a ...


Ethereum-hard-forks

Ethereum hard forks


Friday, March 1, 2019 by

After a recent delay this past January, Ethereum’s Constantinople and Petersburg hard forks just hit at block number 7,280,000. The practice of forks sparks much debate in the industry and many are monitoring these imminent Ethereum hard forks with great anticipation, trepidation, and uncertainty. But what are the implications of Constantinople and Petersb...


Nuweba-emerges-from-stealth-and-opens-beta-program

Nuweba emerges from stealth and opens beta program


Wednesday, February 20, 2019 by

Nuweba opened its beta program and announced a seed funding round of $4.8 million dollars led by Magma Partners and Target Global among other investors. Serverless technology is the most exciting development since the rise of the cloud, freeing developers to focus their time and expertise on perfecting their applications and business logic without worrying about infr...


Develop-on-the-Mainframe-like-any-other-cloud-platform-with-Zowe

Develop on the Mainframe like any other cloud platform with Zowe


Monday, February 11, 2019 by

The Open Mainframe Project announced that Zowe, an open source software framework for the mainframe that strengthens integration with modern enterprise applications, is now production ready less than six months after launching. Any enterprise or solution developer can access the Zowe 1.0 source code or convenience build and incorporate it into their products or services...


How-the-US-Government-shutdown-could-effect-your-app

How the US Government shutdown could effect your app


Friday, January 11, 2019 by

The impacts of the US Government being offline are obvious to the daily operations of the National parks, security agencies, and other federally funded offices. But it doesn't stop there. Techcrunch recently reported how this shutdown (close to the longest running in history), is affecting IPO ready companies, and Karen Hao, a reporter for MIT Technology Review rece...


UN-commission-sets-cyber-security-regulations-for-Europe

UN commission sets cyber security regulations for Europe


Wednesday, January 9, 2019 by

The United Nations Economic Commission for Europe (UNECE) has confirmed it will integrate the widely used ISA/IEC 62443 series of standards into its forthcoming Common Regulatory Framework on Cybersecurity (CRF). The CRF will serve as an official UN policy position statement for Europe. At its recent annual meeting in Geneva, UNECE’s Working Party on Regulatory...


PCE-Supercluster-now-offered-by-Illumio

PCE Supercluster now offered by Illumio


Tuesday, January 8, 2019 by

Illumio, a cybersecurity company delivering micro-segmentation, announced full availability of PCE Supercluster designed for enterprise-scale real-time application dependency mapping and micro-segmentation deployments. PCE Supercluster, which is currently in use by some of the largest organizations in the world, makes Illumio the first company to offer a micro-segmentat...


Gamification-can-transform-your-software-security-program

Gamification can transform your software security program


Tuesday, December 18, 2018 by

No matter the organization, or indeed their individual circumstances, there is one problem I have identified time and time again over the course of my career: AppSec managers, CISOs, CIOs and cybersecurity experts all over the world are rarely able to positively engage their dev teams on security best practice and training. It’s a source of conflict between teams,...


Javascript-programming-model-for-apps-announced-by-Salesforce

Javascript programming model for apps announced by Salesforce


Friday, December 14, 2018 by

Salesforce has announced Lightning Web Components, a programming model that makes it easy for JavaScript developers to code on the Lightning Platform. This standards-based programming model gives developers the freedom to use the tools they love to build components - reusable building blocks for creating Lightning apps and experiences.  Lightning Web Components ...


New-APM-platform-uses-AI-and-runs-on-Amazon-EMR

New APM platform uses AI and runs on Amazon EMR


Monday, December 10, 2018 by

Unravel Data, the application performance management (APM) platform designed for big data workloads, has introduced a full-stack, artificial intelligence (AI)-driven solution for big data workloads running on Amazon EMR. Amazon EMR is a cloud service that enables big data processing using Spark, Kafka, Hadoop, Impala, Hive, and other big data components across dynamical...


AimBrain-joins-the-ForgeRock-Trust-Network-with-biometric-solutions

AimBrain joins the ForgeRock Trust Network with biometric solutions


Thursday, December 6, 2018 by

AimBrain announced its place on the ForgeRock Trust Network, which recently celebrated the traction made by the end of its first year. ForgeRock Trust Network is a global partner programme designed to provide organizations with access to a comprehensive range of authentication, risk and fraud management, identity proofing and identity enrichment solutions, all of which ...


AIOps-and-why-IT-should-care

AIOps and why IT should care


Thursday, November 29, 2018 by

For years, industry leaders have rightfully evangelized the massive benefits of digital transformation. Abandoning outdated legacy systems and processes in favor of cloud-enabled ones helps produce greater insights, lowers operating costs, and streamlines operations for faster time-to-market of new products or services and a better overall customer experience. Already, ...


AI-for-cybersecurity-

AI for cybersecurity


Tuesday, November 27, 2018 by

As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...


Enterprise-security-report-says-mobile-workers-put-data-at-risk

Enterprise security report says mobile workers put data at risk


Wednesday, October 10, 2018 by

According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...