enterprise security

enterprise security news search results

Developer news items we found relating to enterprise security

35 results
AI-software-development-shifts-as-AWS-and-poolside-team-up

AI software development shifts as AWS and poolside team up


Tuesday, December 17, 2024 by

Amazon Web Services and poolside have announced a multi-year agreement to make poolside's generative AI Assistant and foundation models (FMs) available in Amazon Bedrock. Amazon Bedrock is a fully-managed service that offers developers access to high-performing models from leading AI companies through a single API. As a result, enterprise customers will soon be abl...


AppSec-2023-predictions-from-Oxeye-Security

AppSec 2023 predictions from Oxeye Security


Wednesday, February 8, 2023 by

Oxeye, the provider of award-winning cloud-native application security, announced five predictions expected to shape enterprise security spending in 2023. The predictions follow industry-wide research which shows the industry is shifting away from legacy software infrastructure and standardizing on cloud-native applications resulting in the need for new and more ef...


Kubernetes-market-to-overcome-adoption-barriers-in-2021

Kubernetes market to overcome adoption barriers in 2021


Thursday, January 7, 2021 by

Despite its advantages, we predict that 2021 will finally see the Kubernetes market overcome adoption barriers and cloud-native technologies will continue to develop and evolve. Cloud-Native Stack Adoption No Longer a Proof of Concept Cloud-native stack adoption will continue to grow, but the “quality” of growth is changing. In previous years we saw a ...


GitLab-acquires-Peach-Tech-and-Fuzzit

GitLab acquires Peach Tech and Fuzzit


Friday, June 12, 2020 by

GitLab announced it has acquired Peach Tech and Fuzzit. These acquisitions will add fully-mature testing solutions including protocol fuzzing, API fuzzing, DAST API testing, and coverage-guided fuzz testing. This makes GitLab’s DevSecOps offering the first security solution to offer both coverage-guided and behavioral fuzz testing techniques as well as the fi...


Evolve-VM-showcasing-at-Microsoft-Ignite

Evolve VM showcasing at Microsoft Ignite


Thursday, November 7, 2019 by

Adaptiva announced that it will showcase Evolve VM at Microsoft Ignite. This groundbreaking, complete vulnerability life cycle product automatically assesses endpoints for thousands of vulnerability, compliance, and health issues and instantly remediates them as soon as they are detected. Utilizing NIST's National Vulnerability Database and National Checklist Progra...


New-IoT-WiFi-and-BLE-module-operates-for-years-on-a-single-AA-battery

New IoT WiFi and BLE module operates for years on a single AA battery


Tuesday, February 26, 2019 by

Telit announced the availability of its latest module, the WL865E4-P. The low-power Wi-Fi Bluetooth Low Energy (BLE) combination module is based on the Qualcomm QCA4020 system-on-chip (SoC) and is designed for high-bandwidth applications such as health care, video, smart home, and industrial control. Featuring integrated cryptology hardware, the WL865E4-P enables IoT de...


PCE-Supercluster-now-offered-by-Illumio

PCE Supercluster now offered by Illumio


Tuesday, January 8, 2019 by

Illumio, a cybersecurity company delivering micro-segmentation, announced full availability of PCE Supercluster designed for enterprise-scale real-time application dependency mapping and micro-segmentation deployments. PCE Supercluster, which is currently in use by some of the largest organizations in the world, makes Illumio the first company to offer a micro-segmentat...


Privacy-for-Android-boosted-with-decentralized-VPN

Privacy for Android boosted with decentralized VPN


Sunday, January 6, 2019 by

Mysterium Network, an open-source, not-for-profit foundation reinventing internet privacy, security, and freedom, has announced the release of the Mysterium VPN app for Android, which is now available on the Google Play store. The app, which was released today and is also available for Windows and macOS, will allow users to participate in the world’s first dece...


AI-for-cybersecurity-

AI for cybersecurity


Tuesday, November 27, 2018 by

As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...


Container-security-considerations-for-developers

Container security considerations for developers


Monday, October 29, 2018 by

On the path to a secure digital business, secure service containers bring the best of agility and security to development teams – a growing concern for companies from startups to the Fortune 500. By moving the security concern out of the application layer into an encompassing container platform, one provides a very elegant solution to significantly reduced attack ...


Data-warehousing-company-Snowflake-garners-$450M-in-funding

Data warehousing company Snowflake garners $450M in funding


Tuesday, October 16, 2018 by

Snowflake Computing says it has closed $450 million in additional growth funding led by Sequoia Capital. The remainder of Snowflake’s existing investors also participated: Altimeter Capital, Capital One Growth Ventures, ICONIQ Capital, Madrona Venture Group, Redpoint Ventures, Sutter Hill Ventures and Wing Ventures. New investor Meritech Capital also joined t...


NGINX-gets-new-capabilities-to-help-app-teams-develop-and-scale

NGINX gets new capabilities to help app teams develop and scale


Monday, October 15, 2018 by

NGINX has released new enhancements to the NGINX Application Platform - including new releases of NGINX Plus, NGINX Controller, and NGINX Unit. These new releases aim to improve NGINX’s solution in the application delivery controller (ADC) market, as well as introduce new solutions in the API management and service mesh markets. NGINX provides a single platfo...


Enterprise-security-report-says-mobile-workers-put-data-at-risk

Enterprise security report says mobile workers put data at risk


Wednesday, October 10, 2018 by

According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...


Windows-10-security-hygiene-is-a-priority-for-many-says-new-report

Windows 10 security hygiene is a priority for many says new report


Wednesday, September 26, 2018 by

Adaptiva announced the results of its 2018 Enterprise Endpoint Security Survey. The survey showed that security is galvanizing around the move to Windows 10, the operating system that the majority of companies surveyed now run in their organizations. In the survey, over half of respondents indicated that security hygiene is a priority, listing security configuration man...


Netskope-unifies-enterprise-cloud-and-web-security

Netskope unifies enterprise cloud and web security


Thursday, April 5, 2018 by

Netskope has announced the general availability of Netskope for Web, an expansion of the Netskope Cloud Security platform that enables safe web use for enterprise organizations. Powered by the same cloud-native architecture and patented Cloud XD technology of the award-winning and market-leading Netskope cloud access security broker (CASB), Netskope for Web uniquely und...


Kubernetes-platform-helps-simplify-the-app-dev-process

Kubernetes platform helps simplify the app dev process


Monday, February 26, 2018 by

Kublr has developed an enterprise-grade Kubernetes platform that’s not tied to a single cloud, PaaS, OS, or technology stack. With the launch of Kublr 1.8, Kublr is introducing its self-service control plane that enables simplified Kubernetes deployment and management. The Kublr control plane empowers enterprises to run Kubernetes in production at scale out-of-the-box -...


Appdome-extends-its-platform-to-accelerate-mobile-management

Appdome extends its platform to accelerate mobile management


Wednesday, December 6, 2017 by

Appdome has announced the immediate availability of its Mobility Suite, a new service offering that provides integration options for third-party and custom mobile apps being deployed within enterprise mobility management (EMM) solutions. The Appdome Mobility Suite extends EMM systems, allowing EMM and MDM (mobile device management) solutions to reach mobile ap...


Node.js-just-got-better-enterprise-security

Node.js just got better enterprise security


Monday, October 9, 2017 by

At Node.js Interactive North America, npm, Inc. announced new enterprise-grade security features for users of npm and the npm Registry: two-factor authentication for publishing packages and read-only authentication tokens. With more than 550,000 packages for mobile, IoT, front end, back end and robotics, npm is the first software registry to provide two-factor authentic...


Splunk-expands-machine-learning-capabilities

Splunk expands machine learning capabilities


Monday, October 2, 2017 by

Splunk Inc. has announced expanded machine learning capabilities across its product portfolio with the release of their Enterprise 7.0, IT Service Intelligence (ITSI) 3.0, User Behavior Analytics (UBA) 4.0 and updates to their Cloud platform. Splunk also introduced an updated suite of solutions that apply analytics and machine learning to fraud and cloud monitoring use ...


Tips-for-securing-container-deployments

Tips for securing container deployments


Friday, September 1, 2017 by

Container deployments are still susceptible to the regular threats that other types of deployments are - including DDoS and cross-site scripting attacks. In fact, hackers often take advantage of compromised containers to scan sensitive data, download malware, or privilegeunauthorized access to any of your containers, hosts or data centers.Fei Huang is the CEO of NeuVect...


Codeless-security-integrations-by-Blackberry-and-Appdome-announced

Codeless security integrations by Blackberry and Appdome announced


Tuesday, August 15, 2017 by

BlackBerry Limited and Appdome, a cloud hub for mobile app integration, announced they are enabling codeless integration of secure voice, video and messaging capabilities. Available under Appdome’s newest service category, Secure Messaging, the BBM Enterprise SDK (software development kit) offers a growing set of secure communications capabilities that mobile app develo...


The-future-of-cybersecurity-in-machine-learning

The future of cybersecurity in machine learning


Sunday, July 30, 2017 by

McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...


Software-developers-are-easy-targets-for-hackers-study-finds

Software developers are easy targets for hackers study finds


Thursday, July 20, 2017 by

Netsparker Ltd., a company in the web applications security industry, has released survey results showing that most software developers make themselves easy targets for hackers, even when they are behind a corporate firewall. The primary reason is not that their web server software is out of date, however. Instead, it is largely the result of developers running vulnerab...


Apperian-announces-new-security-capabilities

Apperian announces new security capabilities


Monday, July 3, 2017 by

Apperian, an Arxan company and provider of mobile application management (MAM) and security solutions, has announced several platform enhancements, which increase the security of enterprise mobile app data. These updates take advantage of native device capabilities, multiple industry protocols and additional password controls, to provide a solution for distributing secu...


Why-runtime-application-selfprotection-is-critical-for-app-security

Why runtime application selfprotection is critical for app security


Tuesday, June 20, 2017 by

Today most of us go about implementing security from the outside in. The common practice is to start by defining a perimeter and trying to defend it with various security tools. Even though perimeters have been porous for more than a decade, we still can’t give up this notion that if we build a better wall we can keep our enterprises safer.Certainly that is where most e...


The-Netflix-hack:-A-chat-about-securing-your-company

The Netflix hack: A chat about securing your company


Wednesday, May 10, 2017 by

As the digital transformation progresses onwards, the unfortunate side effects are becoming blatantly obvious in the news. It seems like every other day that some new big box company, political party, or individual has their information compromised. But even though only the few biggest companies get the real media attention, hundreds of millions of hacking attempts are ...


Instart-Logic-brings-Helios-AIDriven-security-out-into-the-open

Instart Logic brings Helios AIDriven security out into the open


Friday, April 28, 2017 by

In ancient mythology, Helios was the Greek god of the sun streaking across the heavens in a chariot shining much-needed light onto a dark and dangerous world. That’s exactly what Instart Logic, is doing with their latest announcement of Helios - "using artificial intelligence to illuminate and solve today’s most challenging digital security issues."Web application attac...


CloudBees-Jenkins-Enterprise-announced

CloudBees Jenkins Enterprise announced


Monday, February 27, 2017 by

CloudBees, Inc. announced the availability of CloudBees Jenkins Enterprise to help enterprises accelerate software delivery and meet the rapidly growing volume of software development. Every company in every industry is dependent on software to support strategic initiatives and competitive differentiation. To support this business imperative, IT departments are ado...


Capsule8-comes-out-of-stealth-to-help-protect-Linux-from-attacks

Capsule8 comes out of stealth to help protect Linux from attacks


Wednesday, February 15, 2017 by

Capsule8 has emerged from stealth mode to unveil its plans for the industry’s first container-aware, real-time threat protection platform designed to protect legacy and next-generation Linux infrastructures from both known and unknown attacks. Founded by experienced hackers John Viega, Dino Dai Zovi and Brandon Edwards, Capsule8 is being built on the real-world experien...


Enterprise-BYOD-post-holiday-woes

Enterprise BYOD post holiday woes


Tuesday, January 24, 2017 by

Bring Your Own Device (BYOD) programs are a constant enterprise challenge. For unprepared organizations, the holidays can be especially difficult.Christmas to New Year’s Day is typically a peak time to purchase and/or download apps, so how can your enterprise effectively enroll an influx of new users and devices without compromising program security? While the recent ho...


8-cyber-security-predictions-for-what

8 cyber security predictions for what's to come in AsiaPacific


Thursday, December 29, 2016 by

Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...


PMR

PMR's report on the global SecurityasaService market


Monday, December 19, 2016 by

Adopting the business model of Security-as-a-Service (SaaS) has become a pragmatic choice for companies looking at integrating security with their business infrastructure. Furthermore, emerging technological trends related to the Internet of Things (IoT) and cloud-computing will continue to compel more businesses towards implementation of a Security-as-a-Service busines...


What-an-advanced-threat-approach-for-cloud-security-must-address

What an advanced threat approach for cloud security must address


Wednesday, December 14, 2016 by

Headlines about hacking and malware prove that traditional security methods are not up to the task of protecting organizational infrastructures and data from theft and ransomware. As more organizations embrace cloud-first platforms for everything from customer relationship management (CRM) to enterprise resource planning (ERP) platforms and beyond, they place themselves...


Core-Security-is-making-the-password-reset-process-selfservice,-faster-and-simpler

Core Security is making the password reset process selfservice, faster and simpler


Wednesday, November 30, 2016 by

Core Security announced the release of Core Mobile Reset 1.0 and Core Access Insight 9.2. With the introduction of these solution updates, enterprise security teams will now be able to resolve immediate threats with prognostic analytics applied to the big identity and access data, while also enhancing organizational efficiency.Ineffective password management i...


Intel-Security-Enhances-Unified-Defense-Architecture

Intel Security Enhances Unified Defense Architecture


Thursday, November 3, 2016 by

Intel Security has announced an enhanced unified defense architecture designed to empower organizations to more effectively protect a new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where ...