data breaches

data breaches news search results

Developer news items we found relating to data breaches

35 results
5-mistakes-businesses-make-in-application-development

5 mistakes businesses make in application development


Friday, October 23, 2020 by

5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...


HackNotice-announces-threat-intelligence-platform

HackNotice announces threat intelligence platform


Friday, September 18, 2020 by

HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...


GDPR-and-data-security

GDPR and data security


Friday, September 18, 2020 by

How has the General Data Protection Regulation (GDPR) affected your firm during the past two years? It has been nearly that long since GDPR went into effect across Europe, applicable for any organizations handling the personal information of European citizens. Since that time, it appears to be performing well up to expectations.  Firms of all kinds find themse...


2020-Cloud-Misconfigurations-Report-released-by-DivvyCloud

2020 Cloud Misconfigurations Report released by DivvyCloud


Wednesday, February 19, 2020 by

DivvyCloud released its 2020 Cloud Misconfigurations Report, which substantiates the growing trend of data breaches caused by cloud misconfigurations and quantifies their impact on companies and consumers around the world. DivvyCloud research found that nearly 33.4 billion records were exposed in breaches due to cloud misconfigurations in 2018 and 2019, amounting to nea...


Data-Privacy-Day-2020-is-here

Data Privacy Day 2020 is here


Tuesday, January 28, 2020 by

Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure. Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...


Nuggets-in-the-top-identity-leaders-list-2019

Nuggets in the top identity leaders list 2019


Thursday, December 5, 2019 by

Nuggets announced its inclusion in the One World Identity’s (OWI) Top Identity Leaders List 2019. Securing their place alongside, Google, Microsoft, Visa and Apple, the British startup was credited for its pioneering solution in their annual Identity Landscape Report. The Identity Landscape saw the biggest names in identity shortlisted across 35 categories, pla...


Ethics-standards-and-security-protocols-app-developers-should-follow

Ethics standards and security protocols app developers should follow


Monday, September 30, 2019 by

Consumers put a lot of trust in app developers. Sacrificing data for convenience isn't a new concept - FaceApp is only the most recent example of the low bar set for allowing our private data into the hands of any company that pushes out an app. Yet, even after so many breaches and all-encompassing terms of use, why aren't more developers doing more to advocate ...


The-DMV-is-selling-driver-data-and-Eve-Maler-weighs-in

The DMV is selling driver data and Eve Maler weighs in


Tuesday, September 24, 2019 by

Motherboard broke the news on September 6 that Departments of Motor Vehicles (DMVs) around the nation have been making millions by selling drivers’ personally identifiable information to thousands of businesses. Amongst the DMVs customers are insurance agencies, tow companies, data brokers and even private investigators – all who are able to purchase records...


MariaDB-enterprise-server-helps-you-sleep-at-night

MariaDB enterprise server helps you sleep at night


Thursday, June 20, 2019 by

MariaDB Corporation announced the release of MariaDB Enterprise Server 10.4, code-named “Restful Nights” for the peace of mind it brings enterprise customers. Databases are the backbone of critical business services used every day. A database failure can result in sleepless nights for everyone involved. The new MariaDB Enterprise Server includes added f...


GDPR-report-after-one-year

GDPR report after one year


Wednesday, May 8, 2019 by

Data protection and privacy has always been important, but with the implementation of the European Union’s General Data Protection Regulation, companies are now thinking about it differently and are more critical of how they secure their data - especially as it pertains to sensitive and Personally Identifiable Information (PII). With the one-year anniversary of...


API-security-testing-just-got-easier-with-42Crunch

API security testing just got easier with 42Crunch's new scanner


Thursday, March 21, 2019 by

42Crunch officially released the 42Crunch API Platform, an API security cloud platform to discover vulnerabilities in APIs and protect them from attack. The 42Crunch Platform can protect SaaS, Web, or IoT APIs, as well as microservices. This follows the launch of the free API Contract Security Audit tool at APISecurity.io earlier this month. The tool helps API d...


Videoselfie-authentication-tool-launches

Videoselfie authentication tool launches


Tuesday, February 19, 2019 by

Jumio announced the launch of Jumio Authentication, a new video-selfie authentication that uses biometrics for user authentication, that could be ideal for account logins and high-risk scenarios (e.g., logging in from a foreign IP address or authorizing high-risk transactions such as wire transfers and online purchases). Secure selfie authentication can also be use...


AI-for-cybersecurity-

AI for cybersecurity


Tuesday, November 27, 2018 by

As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...


IAST-supports-AppSec-efficiencies-while-cutting-costs-and-headaches

IAST supports AppSec efficiencies while cutting costs and headaches


Monday, November 26, 2018 by

It’s easy to feel passionate about interactive application security testing (IAST) in the world of application security. You see, IAST makes security testing almost invisible. It’s not something that requires a highly trained team to be brought in to carry out and analyze testing results. It doesn’t hold up other teams or processes from moving forward....


Consumers-and-brands-have-trust-issues-says-report-from-Voxpro

Consumers and brands have trust issues says report from Voxpro


Monday, November 19, 2018 by

Voxpro announced the results of its survey, “Voxpro CX Index: At the Corner of Technology and Human Experience.” The survey, which polled 1,000 U.S. consumers, reveals insights about customer experiences and attitudes toward using automation and chat features for customer service.   Despite the promise of automation and Artificial Intelligence (AI) te...


Blockchain-IoT-can-work-to-your-advantage

Blockchain IoT can work to your advantage


Friday, October 5, 2018 by

Why do the words Blockchain and IoT still sound terrifying to some businesses? Maybe it's because Blockchain terminology was made mainstream by Bitcoin, or perhaps it's that IoT sounds immediate security alarms. According to IBM, using Blockchain in asset management, customs declarations, supply chain networks, commercial property leasing, and countless more ...


Code-security-gamification-company-nabs-$3.5M-in-funding

Code security gamification company nabs $3.5M in funding


Friday, September 14, 2018 by

Secure application development platform provider Secure Code Warrior announced that it has gained US $3.5 million in funding from two strategic venture capital firms. The financing was led by Washington DC-based Paladin Capital Group, with participation from Sydney-based AirTree Ventures. The initial funding round will allow the company to further expand its rapidly gro...


GDPR-compliancy-costs-to-exceed-$1M-for-many

GDPR compliancy costs to exceed $1M for many


Thursday, May 24, 2018 by

GDPR compliancy will cost businesses a pretty penny says the results of Netsparker's GDPR Survey. A survey of more than 300 C-level security executives, conducted online by Propeller Insights on behalf of Netsparker in March 2018, found that companies are taking the new General Data Protection Regulation (GDPR) much more seriously than HIPAA and PCI: 99 percent are acti...


New-partnership-emerges-to-simply-IoT-security

New partnership emerges to simply IoT security


Wednesday, May 16, 2018 by

In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...


The-blockchain-approach-to-data-storage-problems

The blockchain approach to data storage problems


Sunday, May 13, 2018 by

The human race has truly entered the Information Age. Once the epitome of innovation, the floppy disk’s performance is now eclipsed by thumbnail-sized SD cards that boast over 500,000x the capacity of the already-ancient technology. Terabyte-denominated drives are becoming the norm, and prefixes like peta-, exa- and zetta- are being used to quantify the mind-boggling am...


Sonatype-expands-firewall-to-stop-dev-vulnerabilities

Sonatype expands firewall to stop dev vulnerabilities


Friday, March 9, 2018 by

Sonatype has announced that the Nexus Firewall is now available to support the more than 10 million developers currently using the open source version of Nexus Repository. Previously only available to commercial users of Nexus Repository Pro, the newest version of Nexus Firewall gives all Nexus Repo users the ability to automatically stop vulnerable open source componen...


6-ways-your-company-could-be-using-automation-software

6 ways your company could be using automation software


Friday, January 5, 2018 by

When it comes to robots and our future as human beings, there are two different directions your imagination might take you. On one hand, you’ve probably watched terrifying imaginings of machines turning against mankind in films like The Matrix and The Terminator. In contrast, if you look around at the real world, you see can the reality of machines working side by side ...


Exostar-launches-mobile-multifactor-authentication-solution

Exostar launches mobile multifactor authentication solution


Friday, December 15, 2017 by

Exostar has announced the general availability of a new option for multifactor authentication. Exostar Mobile ID is a smartphone or tablet app-based authenticator for which it has achieved Level 3 SAFE-BioPharma certification under the FICAM trust framework. The solution turns an individual’s mobile device into a secure hardware-based second factor for access control to...


Why-your-app-should-have-OAuth-2.0

Why your app should have OAuth 2.0


Tuesday, November 14, 2017 by

Consumer demand couldn’t be more clear - the more apps, the better. On average, consumers launch at least nine apps per day and more than 30 each month, and they tend to browse such apps for hours at a time. Users spend more than three hours a day on their smartphones, and nearly 90 percent of that time is devoted to apps. While much is made of app responsiven...


The-HBO-hack-reveals-how-vulnerable-data-is-to-black-hats

The HBO hack reveals how vulnerable data is to black hats


Thursday, August 31, 2017 by

The HBO hack is the latest in a string of high-profile hacks over the last two years (Dropbox, Yahoo!, UK Ministry of Health) where a handful of vulnerable servers were compromised and used to take down and steal information. Studies have shown the next year represent a turning point in the digitization of enterprise content. A recent Forrester study commissioned by Alf...


Developers-are-most-wary-of-these-technologies-being-hacked

Developers are most wary of these technologies being hacked


Wednesday, August 2, 2017 by

In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology.Propeller Insights conducted the recent survey of U.S.-based software developers for Netsparker from July 5-7, 2017.Government mo...


InnoVault-lets-you-embed-endtoend-data-security-encryption-to-apps

InnoVault lets you embed endtoend data security encryption to apps


Friday, July 21, 2017 by

Tozny, which has built a secure, privacy-preserving and password-free mobile authentication system, has announced the launch of InnoVault, an easy-to-use toolkit allowing developers to embed end-to-end data security encryption capabilities into their websites, apps, or software. As a result, developers can now raise the level of their data security and privacy managemen...


Wait,-the-CIA-can-comprimise-my-iPhone-or-Android

Wait, the CIA can comprimise my iPhone or Android


Tuesday, March 14, 2017 by

In the largest leak of C.I.A. documents, Wikileaks disclosed the tools that C.I.A. uses to hack computers, phones and smart TVs around the world. The C.I.A.’s ability to compromise Apple and Android smartphones is especially troubling, since spies can access private information through these devices, including photos, emails, texts and videos. Further, a program ca...


App-customer-loyalty:-3-things-to-look-for-in-a-loyalty-API

App customer loyalty: 3 things to look for in a loyalty API


Tuesday, February 14, 2017 by

For the modern consumer, rewards are an essential part of their shopping experience; just last year the number of loyalty program memberships in the United States topped three billion - a 26 percent increase from 2013. With a growing demand for loyalty programs, there is no better time for developers to incorporate loyalty into their products, apps, point of sale softwa...


How-the-new-US-administration-will-effect-Internet-privacy

How the new US administration will effect Internet privacy


Thursday, February 2, 2017 by

NordVPN has observed a notable increase in inquiries immediately after the U.S. election and a stable growth of interest from Americans ever since.As the new U.S. President starts his four-year term, many wonder what will be the new policy on government surveillance of ordinary citizens. President Donald Trump, while being vague on his views concerning Internet privacy,...


Security-Intelligence-Platform-from-Exabeam-launched

Security Intelligence Platform from Exabeam launched


Thursday, February 2, 2017 by

Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...


The-data-security-money-pit

The data security money pit


Wednesday, January 25, 2017 by

93% of organizations suffer technical challenges to protect data despite heavy investment in security tools.While data breaches destroy customer confidence, impact revenues, attract large regulatory fines and cost C-levels their jobs, 76% of data security professionals believe in the maturity of their data security strategy, according to a new study. Despite heavy inves...


Blockchain,-IoT,-chatbots,-and-connected-finance:-Built.io-predicts-2017

Blockchain, IoT, chatbots, and connected finance: Built.io predicts 2017


Saturday, December 31, 2016 by

Blockchain will play an integral role in improving IoT securityIn 2016 we saw multiple hacks and data breaches, including the massive DNS attack that caused widespread internet outages. This latest attack was a wakeup call to start thinking about security in terms of the Internet of Things (IoT). Because of that, in the next year we’ll start to see more securi...


Privacy-will-be-the-name-of-the-game-in-2017-

Privacy will be the name of the game in 2017


Thursday, December 22, 2016 by

Editors note: 2017 predictions by Alan Duric, Co-Founder and CTO at Wire   2016 has seen a huge rise in machine learning and connected devices from Amazon Alexa and Google Assistant; to Apple CarPlay and Android Auto. The world has become truly connected but not without the growing pains that any emerging industry is bound to face.    In Dec...


Humans-are-still-the-biggest-threat-to-cyber-security-report-shows

Humans are still the biggest threat to cyber security report shows


Saturday, December 17, 2016 by

Global technology company Nuix have released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behavior was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective ...