Tenstorrent and Infinia launch Abu Dhabi based Sovereign AI Initiative
Wednesday, March 4, 2026 by Brittany Hainzinger
Tenstorrent USA, Inc. and Infinia Technologies Limited are excited to announce a strategic partnership agreement to co-develop and commercialize sovereign AI infrastructure solutions from Abu Dhabi, with an initial focus on government, financial services, and critical infrastructure customers across the GCC. The agreement was signed by Jim Keller, CEO of Tenst...
AI generated scams and phishing in 2026
Monday, January 5, 2026 by Austin Harris
David Stonehill, CTO, NetLib Security offers his insight into what 2026 will hold for us in the way of AI scams.
By 2026, AI-generated scams and phishing will be virtually indistinguishable from legitimate apps, storefronts, and communications making detection alone unreliable. App developers will need to design for breach resilience using MFA, passkeys, AI-driven se...
TestRail launches AI-Powered test case generation
Friday, October 24, 2025 by Brittany Hainzinger
TestRail has released version 9.5, introducing a significant step in automated quality assurance through AI-powered test case generation built on the Sembi IQ engine. The new system aims to streamline how QA teams produce test cases, providing a faster and more efficient way to ensure complete test coverage while maintaining control and security.
The feature allows t...
Java 25 focus on developers and AI in new Oracle release
Tuesday, October 7, 2025 by Austin Harris
The latest release of Oracle’s long-standing programming platform, designed to support both traditional and AI-enhanced applications. The update includes thousands of improvements, emphasizing productivity, performance, stability, and security, while providing long-term support for enterprises.
Enhanced support for AI integration
Java 25 includes updates aim...
Open source messaging app Bitchat works without signal or internet
Thursday, October 2, 2025 by Trey Abbe
Bitchat is a messaging app designed to operate without relying on cellular networks or internet connections. It uses peer-to-peer communication, allowing devices to connect directly via Bluetooth or Wi-Fi. Messages can be sent even when traditional networks are unavailable, making the app useful in areas with poor coverage or during temporary outages.
The app uses a ...
Push for FTC to Investigate Microsoft
Monday, September 22, 2025 by Austin Harris
U.S. Senator Ron Wyden has formally requested the Federal Trade Commission to examine Microsoft for what he describes as significant cybersecurity shortcomings. The request cites repeated security incidents and raises questions about the company’s role in safeguarding critical infrastructure.
Senator highlights cybersecurity risks
In a letter addressed to FT...
Jack Dorsey unveils Sun Day
Tuesday, July 22, 2025 by Austin Harris
Jack Dorsey, known globally as the co-founder of Twitter and CEO of Block, has been on a creative tear lately, launching back-to-back experimental apps. The latest addition to his portfolio is Sun Day, a simple yet intriguing app aimed at helping users track their sun exposure, monitor UV levels, and estimate vitamin D synthesis, all from their smartphones.
Available...
Ulticam IQ with Gemini on Google Cloud
Thursday, July 10, 2025 by Austin Harris
Ulticam IQ a new line of AI powered security cameras designed for advanced features and affordability from global AIoT solutions leader Xthings will now come with advanced cloud AI features using Gemini on Google Cloud bringing professional level video analytics to homeowners with free cloud recording on a rolling 7 day basis.
Ulticam IQ with Gemini on Google Cloud
...
DataKrypto launches new AI models
Friday, May 9, 2025 by Richard Harris
DataKrypto launched a new solution that protects AI models and the data of businesses using them. Based on the company’s patented FHE technology, the solution, FHEnom for AI, addresses a critical security gap and delivers unprecedented AI protection.
FHEnom for AI is a zero-knowledge framework that safeguards both customized open-source AI models (adapted for s...
Cybersecurity in 2025
Tuesday, February 4, 2025 by Richard Harris
Timothy Hollebeek shares his insights on the key cybersecurity trends shaping 2025, focusing on the evolving landscape of digital trust and identity. As quantum computing and AI continue to advance, they bring both groundbreaking innovations and new cybersecurity risks. The introduction of Google’s Willow chip signals a new era of quantum technology, accelerating ...
NetLib Security predictions 2025
Thursday, January 2, 2025 by Richard Harris
The leading prediction for 2025 will sound familiar: Generative AI directly affects your privacy rights. In many ways, this is a twist on the typical cybersecurity problem. Rather than a hacker or a bad actor breaking in to steal your data, we are being asked to hand our keys to the companies we often trust the most: Microsoft, Apple, Dropbox, and Google!
NetLib Secu...
API Security Perspectives 2025 report from Kong Inc
Monday, December 30, 2024 by Richard Harris
Kong Inc. released findings from their API Security Perspectives 2025: AI-Enhanced Threats and API Security Report which highlights today’s API security landscape and how new developments in AI will impact it. Most notably, 25% of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75% of respondents expressing serious concern a...
Emerging features to consider for mobile app development
Wednesday, November 13, 2024 by Richard Harris
In an era where mobile applications are ubiquitous, with a staggering 8.93 million apps vying for attention across various app stores, distinguishing your app from the competition is paramount. While aesthetics undoubtedly play a role in user attraction, it is the functionality and features of an app that truly captivate and retain users. Whether you are embarking on yo...
.NET 9 set to release at .NET Conf 2024
Friday, February 16, 2024 by Richard Harris
The .NET community is embarking on another exciting annual release cycle with the much-anticipated arrival of .NET 9. Developers are urged to seamlessly transition their applications to the current .NET 8 version while setting their sights on the groundbreaking features that .NET 9 promises to unveil at the .NET Conf 2024, scheduled for the end of this year.
The prim...
AI cybersecurity impacts according to NetLib Security
Monday, December 18, 2023 by Richard Harris
This is an easy call to make: NetLib Security predicts that Artificial Intelligence - Generative AI - will continue to heavily impact the world of cybersecurity, upping the game for defensive players, while giving cybercriminals more tools on the offensive side.
2023 was a year in which AI seemed suddenly to be everywhere. Although AI is not a new field, ChatGPT and ...
BadInternetBills site launches to oppose bills in Congress
Friday, May 26, 2023 by Austin Harris
Fight for the Future has recently announced the launch of badinternetbills.com, in response to a slew of bills targeting free expression and end-to-end encryption. It is a home base for people to take action against the numerous misguided bills making their way through Congress, all congregated on one easy-to-use site.
According to Fight for the Future, "De...
Quantum cryptography and network market is growing
Friday, May 5, 2023 by Richard Harris
The global quantum cryptography and network market was valued at US$ 698.31 million in 2022 and is projected to reach US$ 8,136.60 million by 2031 at a projected CAGR of around 32.99% during the forecast period 2023-2031. The increasing need for secure communication and data transfer, along with the rising adoption of quantum cryptography solutions by governments a...
Oxeye discovers vulnerability in HashiCorp Vault Project
Tuesday, April 25, 2023 by Austin Harris
Oxeye announced the discovery of a new vulnerability in the HashiCorp Vault Project that has now been patched. HashiCorp Vault is a popular identity-based secret and encryption management system used to control access to API encryption keys, passwords, and certificates. The vulnerability was automatically discovered and reported by the Oxeye Platform during a deployment...
Apex Legends Mobile Hyperbeat event
Tuesday, August 23, 2022 by Austin Harris
EA and Respawn Entertainment are pleased to announce a brand new event for Apex Legends Mobile. The Hyperbeat event launched with lots of hot new features to explore. In addition to the arrival of Legend Crypto, the Hyperbeat event also included a brand new ranked split, new events, a new Battle Pass, and updates to core systems.
Hyperbeat event updates
Fans ...
PKI Spotlight security solution launches
Wednesday, April 6, 2022 by Austin Harris
PKI Solutions announced the introduction of PKI Spotlight, an industry solution that provides real-time monitoring and alerting of the availability, configuration, and security of all organizations' PKI environments, all consolidated into one easy-to-use dashboard. PKI is a foundational technology for almost every identity and data encryption solution...
Software cyberattack predictions for 2022
Tuesday, January 4, 2022 by Richard Harris
Nigel Thorpe hails from a software development background and moved to the IT security industry with Entrust Technologies during the early days of PKI. His knowledge has benefited a number of security companies in the UK, Canada, and the USA, and he now serves as Technical Director at SecureAge Technology. With a wide range of experience in different business environmen...
Crypto APIs launch MPC Wallet as a Service
Wednesday, November 17, 2021 by Brittany Hainzinger
The Bulgarian-based Software-as-a-Service startup Crypto APIs has launched an improved Wallet as a Service (WaaS) to provide small and medium businesses, enterprises, and institutions with a more secure and reliable multi-currency digital wallet.
Crypto APIs launch MPC Wallet as a Service
The service utilizes an advanced Multi-Party Computation (MPC) cryptographic...
Improving cloud security practices for DevOps teams
Thursday, August 26, 2021 by Richard Harris
Technology integration allows customers to securely leverage existing keys, secrets, tokens, and certificates into declarative CI/CD pipelines and ease the management of HashiCorp Vault infrastructure and security practices.
Opsera and HashiCorp partner with plans on improving cloud security practices for DevOps teams
Opsera, the Continuous Orchestration platform ...
Code AR apps with one line of code
Friday, March 12, 2021 by Richard Harris
There’s a new spatial AR platform in town, and it's empowering app developers with the tools to quickly create and integrate location-based AR into their apps with a single line of code.
To create excitement for their new ReSight SDK before launch, the company recently held a developer contest, where more than 75 developers submitted their ideas for integra...
Quantum computing in 2021
Monday, January 11, 2021 by Brittany Hainzinger
Quantum computing is likely to become practical soon, with the capability to break many encryption algorithms. Organizations should plan to upgrade to TLS 1.3 and quantum-safe cryptographic ciphers soon. Big Tech vendors Google and Microsoft will make updates to web browsers, but the server-side is for your organization to review and change. Kick off a Y2 K-li...
5 mistakes businesses make in application development
Friday, October 23, 2020 by Mayur S Shah
5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development
Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...
ArangoDB add new features to their scalable multi-model graph database
Thursday, August 27, 2020 by Brittany Hainzinger
ArangoDB announced the GA release of ArangoDB 3.7. ArangoDB 3.7 introduces new graph and search features that improve the database's capability to work with highly-connected data at any scale -- furthering the company’s goal of providing the most flexible database on the market.
Key features in ArangoDB 3.7 include improvements for distributed scale-out gra...
New version of Terrascan from Accurics
Thursday, August 20, 2020 by Brittany Hainzinger
Accurics unveiled a major upgrade to Terrascan, the open source static code analyzer that enables developers to build secure infrastructure as code (IaC). The new release ensures Terraform templates avoid common security pitfalls in popular cloud providers such as AWS, Azure, and Google Cloud Platform. Built-in extensibility will enable support for other popular technol...
Instaclustr adds Kafka Connect to Managed Open Source Data Solutions
Monday, June 15, 2020 by Brittany Hainzinger
Instaclustr announced the general availability of Instaclustr Managed Kafka Connect. This newest addition to the Instaclustr Managed Platform enables seamless data movement between Apache Kafka and other data systems at scale. Kafka Connect joins Apache Kafka, Apache Cassandra, Apache Spark, and Elasticsearch as another fast, proven, resilient, and highly flexible open ...
BlackBerry and ZTR partner to revolutionize the rail industry
Tuesday, April 7, 2020 by Austin Harris
ZTR and BlackBerry Limited have announced they are combining their proven technology expertise to offer railcar owners, operators, and suppliers a powerful new digital monitoring solution.
Recognizing there was an immediate industry need for a remote railcar monitoring solution that could withstand the rugged conditions of the railway, provide greater fleet...
Immediate availability of SkySQL from MariaDB
Thursday, April 2, 2020 by Brittany Hainzinger
MariaDB Corporation announced the immediate availability of MariaDB SkySQL, a database-as-a-service (DBaaS), to unlock the full power of MariaDB Platform for transactions, analytics or both, and optimized with a cloud-native architecture. SkySQL delivers the “MariaDB in the cloud” experience customers have been waiting for - fully-featured, fully c...
To encrypt or not encrypt legacy devices no longer a choice
Thursday, March 19, 2020 by Austin Harris
Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...
Red Hat OpenShift now available for IBM and LinuxONE
Tuesday, February 18, 2020 by Brittany Hainzinger
Red Hat OpenShift Container Platform is generally available for IBM Z® and IBM LinuxONE™.
“Containers are the next generation of software-defined compute that enterprises will leverage to accelerate their digital transformation initiatives,” says Gary Chen, Research Director at IDC. “IDC estimates that 71% of organizations are in the proce...
Dangers of quantum hacking
Tuesday, February 11, 2020 by Richard Harris
Active Cypher has built a password-hacking quantum computer to demonstrate the dangers of quantum hacking.
Using $600 worth of hardware parts easily purchased online or at a local electronics store, Active Cypher’s founder and CTO, Dan Gleason, created a portable quantum computer dubbed QUBY (named after qubits, the basic unit of quantum information). QUBY runs...
Data Privacy Day 2020 is here
Tuesday, January 28, 2020 by Richard Harris
Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure.
Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...