data breaches

data breaches news search results

Developer news items we found relating to data breaches

35 results
Ethics-standards-and-security-protocols-app-developers-should-follow

Ethics standards and security protocols app developers should follow


Monday, September 30, 2019 by

Consumers put a lot of trust in app developers. Sacrificing data for convenience isn't a new concept - FaceApp is only the most recent example of the low bar set for allowing our private data into the hands of any company that pushes out an app. Yet, even after so many breaches and all-encompassing terms of use, why aren't more developers doing more to advocate ...


The-DMV-is-selling-driver-data-and-Eve-Maler-weighs-in

The DMV is selling driver data and Eve Maler weighs in


Tuesday, September 24, 2019 by

Motherboard broke the news on September 6 that Departments of Motor Vehicles (DMVs) around the nation have been making millions by selling drivers’ personally identifiable information to thousands of businesses. Amongst the DMVs customers are insurance agencies, tow companies, data brokers and even private investigators – all who are able to purchase records...


MariaDB-enterprise-server-helps-you-sleep-at-night

MariaDB enterprise server helps you sleep at night


Thursday, June 20, 2019 by

MariaDB Corporation announced the release of MariaDB Enterprise Server 10.4, code-named “Restful Nights” for the peace of mind it brings enterprise customers. Databases are the backbone of critical business services used every day. A database failure can result in sleepless nights for everyone involved. The new MariaDB Enterprise Server includes added f...


GDPR-report-after-one-year

GDPR report after one year


Wednesday, May 8, 2019 by

Data protection and privacy has always been important, but with the implementation of the European Union’s General Data Protection Regulation, companies are now thinking about it differently and are more critical of how they secure their data - especially as it pertains to sensitive and Personally Identifiable Information (PII). With the one-year anniversary of...


API-security-testing-just-got-easier-with-42Crunch

API security testing just got easier with 42Crunch's new scanner


Thursday, March 21, 2019 by

42Crunch officially released the 42Crunch API Platform, an API security cloud platform to discover vulnerabilities in APIs and protect them from attack. The 42Crunch Platform can protect SaaS, Web, or IoT APIs, as well as microservices. This follows the launch of the free API Contract Security Audit tool at APISecurity.io earlier this month. The tool helps API d...


Videoselfie-authentication-tool-launches

Videoselfie authentication tool launches


Tuesday, February 19, 2019 by

Jumio announced the launch of Jumio Authentication, a new video-selfie authentication that uses biometrics for user authentication, that could be ideal for account logins and high-risk scenarios (e.g., logging in from a foreign IP address or authorizing high-risk transactions such as wire transfers and online purchases). Secure selfie authentication can also be use...


AI-for-cybersecurity-

AI for cybersecurity


Tuesday, November 27, 2018 by

As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...


IAST-supports-AppSec-efficiencies-while-cutting-costs-and-headaches

IAST supports AppSec efficiencies while cutting costs and headaches


Monday, November 26, 2018 by

It’s easy to feel passionate about interactive application security testing (IAST) in the world of application security. You see, IAST makes security testing almost invisible. It’s not something that requires a highly trained team to be brought in to carry out and analyze testing results. It doesn’t hold up other teams or processes from moving forward....


Consumers-and-brands-have-trust-issues-says-report-from-Voxpro

Consumers and brands have trust issues says report from Voxpro


Monday, November 19, 2018 by

Voxpro announced the results of its survey, “Voxpro CX Index: At the Corner of Technology and Human Experience.” The survey, which polled 1,000 U.S. consumers, reveals insights about customer experiences and attitudes toward using automation and chat features for customer service.   Despite the promise of automation and Artificial Intelligence (AI) te...


Blockchain-IoT-can-work-to-your-advantage

Blockchain IoT can work to your advantage


Friday, October 5, 2018 by

Why do the words Blockchain and IoT still sound terrifying to some businesses? Maybe it's because Blockchain terminology was made mainstream by Bitcoin, or perhaps it's that IoT sounds immediate security alarms. According to IBM, using Blockchain in asset management, customs declarations, supply chain networks, commercial property leasing, and countless more ...


Code-security-gamification-company-nabs-$3.5M-in-funding

Code security gamification company nabs $3.5M in funding


Friday, September 14, 2018 by

Secure application development platform provider Secure Code Warrior announced that it has gained US $3.5 million in funding from two strategic venture capital firms. The financing was led by Washington DC-based Paladin Capital Group, with participation from Sydney-based AirTree Ventures. The initial funding round will allow the company to further expand its rapidly gro...


GDPR-compliancy-costs-to-exceed-$1M-for-many

GDPR compliancy costs to exceed $1M for many


Thursday, May 24, 2018 by

GDPR compliancy will cost businesses a pretty penny says the results of Netsparker's GDPR Survey. A survey of more than 300 C-level security executives, conducted online by Propeller Insights on behalf of Netsparker in March 2018, found that companies are taking the new General Data Protection Regulation (GDPR) much more seriously than HIPAA and PCI: 99 percent are acti...


New-partnership-emerges-to-simply-IoT-security

New partnership emerges to simply IoT security


Wednesday, May 16, 2018 by

In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...


The-blockchain-approach-to-data-storage-problems

The blockchain approach to data storage problems


Sunday, May 13, 2018 by

The human race has truly entered the Information Age. Once the epitome of innovation, the floppy disk’s performance is now eclipsed by thumbnail-sized SD cards that boast over 500,000x the capacity of the already-ancient technology. Terabyte-denominated drives are becoming the norm, and prefixes like peta-, exa- and zetta- are being used to quantify the mind-boggling am...


Sonatype-expands-firewall-to-stop-dev-vulnerabilities

Sonatype expands firewall to stop dev vulnerabilities


Friday, March 9, 2018 by

Sonatype has announced that the Nexus Firewall is now available to support the more than 10 million developers currently using the open source version of Nexus Repository. Previously only available to commercial users of Nexus Repository Pro, the newest version of Nexus Firewall gives all Nexus Repo users the ability to automatically stop vulnerable open source componen...


6-ways-your-company-could-be-using-automation-software

6 ways your company could be using automation software


Friday, January 5, 2018 by

When it comes to robots and our future as human beings, there are two different directions your imagination might take you. On one hand, you’ve probably watched terrifying imaginings of machines turning against mankind in films like The Matrix and The Terminator. In contrast, if you look around at the real world, you see can the reality of machines working side by side ...


Exostar-launches-mobile-multifactor-authentication-solution

Exostar launches mobile multifactor authentication solution


Friday, December 15, 2017 by

Exostar has announced the general availability of a new option for multifactor authentication. Exostar Mobile ID is a smartphone or tablet app-based authenticator for which it has achieved Level 3 SAFE-BioPharma certification under the FICAM trust framework. The solution turns an individual’s mobile device into a secure hardware-based second factor for access control to...


Why-your-app-should-have-OAuth-2.0

Why your app should have OAuth 2.0


Tuesday, November 14, 2017 by

Consumer demand couldn’t be more clear - the more apps, the better. On average, consumers launch at least nine apps per day and more than 30 each month, and they tend to browse such apps for hours at a time. Users spend more than three hours a day on their smartphones, and nearly 90 percent of that time is devoted to apps. While much is made of app responsiven...


The-HBO-hack-reveals-how-vulnerable-data-is-to-black-hats

The HBO hack reveals how vulnerable data is to black hats


Thursday, August 31, 2017 by

The HBO hack is the latest in a string of high-profile hacks over the last two years (Dropbox, Yahoo!, UK Ministry of Health) where a handful of vulnerable servers were compromised and used to take down and steal information. Studies have shown the next year represent a turning point in the digitization of enterprise content. A recent Forrester study commissioned by Alf...


Developers-are-most-wary-of-these-technologies-being-hacked

Developers are most wary of these technologies being hacked


Wednesday, August 2, 2017 by

In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology.Propeller Insights conducted the recent survey of U.S.-based software developers for Netsparker from July 5-7, 2017.Government mo...


InnoVault-lets-you-embed-endtoend-data-security-encryption-to-apps

InnoVault lets you embed endtoend data security encryption to apps


Friday, July 21, 2017 by

Tozny, which has built a secure, privacy-preserving and password-free mobile authentication system, has announced the launch of InnoVault, an easy-to-use toolkit allowing developers to embed end-to-end data security encryption capabilities into their websites, apps, or software. As a result, developers can now raise the level of their data security and privacy managemen...


Wait,-the-CIA-can-comprimise-my-iPhone-or-Android

Wait, the CIA can comprimise my iPhone or Android


Tuesday, March 14, 2017 by

In the largest leak of C.I.A. documents, Wikileaks disclosed the tools that C.I.A. uses to hack computers, phones and smart TVs around the world. The C.I.A.’s ability to compromise Apple and Android smartphones is especially troubling, since spies can access private information through these devices, including photos, emails, texts and videos. Further, a program ca...


App-customer-loyalty:-3-things-to-look-for-in-a-loyalty-API

App customer loyalty: 3 things to look for in a loyalty API


Tuesday, February 14, 2017 by

For the modern consumer, rewards are an essential part of their shopping experience; just last year the number of loyalty program memberships in the United States topped three billion - a 26 percent increase from 2013. With a growing demand for loyalty programs, there is no better time for developers to incorporate loyalty into their products, apps, point of sale softwa...


How-the-new-US-administration-will-effect-Internet-privacy

How the new US administration will effect Internet privacy


Thursday, February 2, 2017 by

NordVPN has observed a notable increase in inquiries immediately after the U.S. election and a stable growth of interest from Americans ever since.As the new U.S. President starts his four-year term, many wonder what will be the new policy on government surveillance of ordinary citizens. President Donald Trump, while being vague on his views concerning Internet privacy,...


Security-Intelligence-Platform-from-Exabeam-launched

Security Intelligence Platform from Exabeam launched


Thursday, February 2, 2017 by

Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...


The-data-security-money-pit

The data security money pit


Wednesday, January 25, 2017 by

93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...


Blockchain,-IoT,-chatbots,-and-connected-finance:-Built.io-predicts-2017

Blockchain, IoT, chatbots, and connected finance: Built.io predicts 2017


Saturday, December 31, 2016 by

Blockchain will play an integral role in improving IoT securityIn 2016 we saw multiple hacks and data breaches, including the massive DNS attack that caused widespread internet outages. This latest attack was a wakeup call to start thinking about security in terms of the Internet of Things (IoT). Because of that, in the next year we’ll start to see more securi...


Privacy-will-be-the-name-of-the-game-in-2017-

Privacy will be the name of the game in 2017


Thursday, December 22, 2016 by

Editors note: 2017 predictions by Alan Duric, Co-Founder and CTO at Wire   2016 has seen a huge rise in machine learning and connected devices from Amazon Alexa and Google Assistant; to Apple CarPlay and Android Auto. The world has become truly connected but not without the growing pains that any emerging industry is bound to face.    In Dec...


Humans-are-still-the-biggest-threat-to-cyber-security-report-shows

Humans are still the biggest threat to cyber security report shows


Saturday, December 17, 2016 by

Global technology company Nuix have released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behavior was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective ...


What

What's so tricky about Android security anyway


Monday, December 12, 2016 by

Android authentication can be a tricky business because it can help identify the user, but it can also open the door to hackers at the same time. It all comes down to the device administrator access which comes with a lot of benefits like. Device administrator access provides complete device management access rights that include creating and managing poli...


New-Security-Report-2016-shows-64-percent-of-millennials-experienced-a-comprised-account-hack

New Security Report 2016 shows 64 percent of millennials experienced a comprised account hack


Thursday, November 17, 2016 by

TeleSign has released its Consumer Account Security Report 2016, providing insight into consumer sentiments on online security and the value they place on their digital lives. Of the 1,300 U.S. consumers surveyed, nearly a third report the value of their online life at $100,000 to priceless. Further, more than half of the respondents surveyed (55 percent) place the onus...


The-intersection-of-data-security-and-quality-assurance

The intersection of data security and quality assurance


Monday, October 31, 2016 by

In today’s threat-laden environment, where production data is one of the chief targets of hackers, organizations developing software must expend both time and resources securing their production data. One of the simplest ways to ensure security for software testing activities is through the use of targeted, advanced data-handling solutions that can synthesize and virtua...


New-research-shows-that-using-advanced-security-drives-new-business-growth

New research shows that using advanced security drives new business growth


Wednesday, October 12, 2016 by

A global study from CA Technologies revealed that organizations are measuring the success of IT security beyond just breaches and compliance; they now are including business performance indicators that contribute directly to revenue growth. The study, The Security Imperative: Driving Business Growth in the App Economy, polled 1,770 senior business and IT executives, inc...


Swift-Programmers-Using-Checkmarx-Can-Now-Detect-Security-and-Code-Flaws

Swift Programmers Using Checkmarx Can Now Detect Security and Code Flaws


Wednesday, September 7, 2016 by

Since launching publicly at Apple’s WWDC in 2014, Swift has soared in popularity amongst programmers and has caught the attention of other major technology players in the process. Google is now even considering implementing Swift as a “first class” language for Android. Facebook and Uber are exploring ways to make Swift more central to their operations, while IBM, ...


IBM-Security-Channels-Its-Inner-XMen-with-Launch-of-IBM-XForce-Red-Security-Division

IBM Security Channels Its Inner XMen with Launch of IBM XForce Red Security Division


Friday, August 5, 2016 by

Someone in charge of naming divisions at IBM must have been a big Sci-Fi fan as is evidenced with IBM Security’s name for the a news security task force - IBM X-Force Red. Yep, that’s the name for a new group of IBM security professionals and ethical hackers whose goal is to help businesses discover vulnerabilities in their computer networks, hardware, and software...