AppSec 2023 predictions from Oxeye Security
Wednesday, February 8, 2023 by Freeman Lightner
Oxeye, the provider of award-winning cloud-native application security, announced five predictions expected to shape enterprise security spending in 2023. The predictions follow industry-wide research which shows the industry is shifting away from legacy software infrastructure and standardizing on cloud-native applications resulting in the need for new and more ef...
Kubernetes market to overcome adoption barriers in 2021
Thursday, January 7, 2021 by Brittany Hainzinger
Despite its advantages, we predict that 2021 will finally see the Kubernetes market overcome adoption barriers and cloud-native technologies will continue to develop and evolve.
Cloud-Native Stack Adoption No Longer a Proof of Concept
Cloud-native stack adoption will continue to grow, but the “quality” of growth is changing. In previous years we saw a ...
GitLab acquires Peach Tech and Fuzzit
Friday, June 12, 2020 by Brittany Hainzinger
GitLab announced it has acquired Peach Tech and Fuzzit. These acquisitions will add fully-mature testing solutions including protocol fuzzing, API fuzzing, DAST API testing, and coverage-guided fuzz testing. This makes GitLab’s DevSecOps offering the first security solution to offer both coverage-guided and behavioral fuzz testing techniques as well as the fi...
Evolve VM showcasing at Microsoft Ignite
Thursday, November 7, 2019 by Brittany Hainzinger
Adaptiva announced that it will showcase Evolve VM at Microsoft Ignite. This groundbreaking, complete vulnerability life cycle product automatically assesses endpoints for thousands of vulnerability, compliance, and health issues and instantly remediates them as soon as they are detected. Utilizing NIST's National Vulnerability Database and National Checklist Progra...
New IoT WiFi and BLE module operates for years on a single AA battery
Tuesday, February 26, 2019 by Christian Hargrave
Telit announced the availability of its latest module, the WL865E4-P. The low-power Wi-Fi Bluetooth Low Energy (BLE) combination module is based on the Qualcomm QCA4020 system-on-chip (SoC) and is designed for high-bandwidth applications such as health care, video, smart home, and industrial control. Featuring integrated cryptology hardware, the WL865E4-P enables IoT de...
PCE Supercluster now offered by Illumio
Tuesday, January 8, 2019 by Christian Hargrave
Illumio, a cybersecurity company delivering micro-segmentation, announced full availability of PCE Supercluster designed for enterprise-scale real-time application dependency mapping and micro-segmentation deployments. PCE Supercluster, which is currently in use by some of the largest organizations in the world, makes Illumio the first company to offer a micro-segmentat...
Privacy for Android boosted with decentralized VPN
Sunday, January 6, 2019 by Christian Hargrave
Mysterium Network, an open-source, not-for-profit foundation reinventing internet privacy, security, and freedom, has announced the release of the Mysterium VPN app for Android, which is now available on the Google Play store.
The app, which was released today and is also available for Windows and macOS, will allow users to participate in the world’s first dece...
AI for cybersecurity
Tuesday, November 27, 2018 by Richard Harris
As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...
Container security considerations for developers
Monday, October 29, 2018 by Richard Harris
On the path to a secure digital business, secure service containers bring the best of agility and security to development teams – a growing concern for companies from startups to the Fortune 500. By moving the security concern out of the application layer into an encompassing container platform, one provides a very elegant solution to significantly reduced attack ...
Data warehousing company Snowflake garners $450M in funding
Tuesday, October 16, 2018 by Christian Hargrave
Snowflake Computing says it has closed $450 million in additional growth funding led by Sequoia Capital. The remainder of Snowflake’s existing investors also participated: Altimeter Capital, Capital One Growth Ventures, ICONIQ Capital, Madrona Venture Group, Redpoint Ventures, Sutter Hill Ventures and Wing Ventures. New investor Meritech Capital also joined t...
NGINX gets new capabilities to help app teams develop and scale
Monday, October 15, 2018 by Richard Harris
NGINX has released new enhancements to the NGINX Application Platform - including new releases of NGINX Plus, NGINX Controller, and NGINX Unit. These new releases aim to improve NGINX’s solution in the application delivery controller (ADC) market, as well as introduce new solutions in the API management and service mesh markets. NGINX provides a single platfo...
Enterprise security report says mobile workers put data at risk
Wednesday, October 10, 2018 by Christian Hargrave
According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...
Windows 10 security hygiene is a priority for many says new report
Wednesday, September 26, 2018 by Christian Hargrave
Adaptiva announced the results of its 2018 Enterprise Endpoint Security Survey. The survey showed that security is galvanizing around the move to Windows 10, the operating system that the majority of companies surveyed now run in their organizations. In the survey, over half of respondents indicated that security hygiene is a priority, listing security configuration man...
Netskope unifies enterprise cloud and web security
Thursday, April 5, 2018 by Christian Hargrave
Netskope has announced the general availability of Netskope for Web, an expansion of the Netskope Cloud Security platform that enables safe web use for enterprise organizations. Powered by the same cloud-native architecture and patented Cloud XD technology of the award-winning and market-leading Netskope cloud access security broker (CASB), Netskope for Web uniquely und...
Kubernetes platform helps simplify the app dev process
Monday, February 26, 2018 by Richard Harris
Kublr has developed an enterprise-grade Kubernetes platform that’s not tied to a single cloud, PaaS, OS, or technology stack. With the launch of Kublr 1.8, Kublr is introducing its self-service control plane that enables simplified Kubernetes deployment and management. The Kublr control plane empowers enterprises to run Kubernetes in production at scale out-of-the-box -...
Appdome extends its platform to accelerate mobile management
Wednesday, December 6, 2017 by Christian Hargrave
Appdome has announced the immediate availability of its Mobility Suite, a new service offering that provides integration options for third-party and custom mobile apps being deployed within enterprise mobility management (EMM) solutions. The Appdome Mobility Suite extends EMM systems, allowing EMM and MDM (mobile device management) solutions to reach mobile ap...
Node.js just got better enterprise security
Monday, October 9, 2017 by Christian Hargrave
At Node.js Interactive North America, npm, Inc. announced new enterprise-grade security features for users of npm and the npm Registry: two-factor authentication for publishing packages and read-only authentication tokens. With more than 550,000 packages for mobile, IoT, front end, back end and robotics, npm is the first software registry to provide two-factor authentic...
Splunk expands machine learning capabilities
Monday, October 2, 2017 by Richard Harris
Splunk Inc. has announced expanded machine learning capabilities across its product portfolio with the release of their Enterprise 7.0, IT Service Intelligence (ITSI) 3.0, User Behavior Analytics (UBA) 4.0 and updates to their Cloud platform. Splunk also introduced an updated suite of solutions that apply analytics and machine learning to fraud and cloud monitoring use ...
Tips for securing container deployments
Friday, September 1, 2017 by Richard Harris
Container deployments are still susceptible to the regular threats that other types of deployments are - including DDoS and cross-site scripting attacks. In fact, hackers often take advantage of compromised containers to scan sensitive data, download malware, or privilegeunauthorized access to any of your containers, hosts or data centers.Fei Huang is the CEO of NeuVect...
Codeless security integrations by Blackberry and Appdome announced
Tuesday, August 15, 2017 by Richard Harris
BlackBerry Limited and Appdome, a cloud hub for mobile app integration, announced they are enabling codeless integration of secure voice, video and messaging capabilities. Available under Appdome’s newest service category, Secure Messaging, the BBM Enterprise SDK (software development kit) offers a growing set of secure communications capabilities that mobile app develo...
The future of cybersecurity in machine learning
Sunday, July 30, 2017 by Richard Harris
McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...
Software developers are easy targets for hackers study finds
Thursday, July 20, 2017 by Richard Harris
Netsparker Ltd., a company in the web applications security industry, has released survey results showing that most software developers make themselves easy targets for hackers, even when they are behind a corporate firewall. The primary reason is not that their web server software is out of date, however. Instead, it is largely the result of developers running vulnerab...
Apperian announces new security capabilities
Monday, July 3, 2017 by Richard Harris
Apperian, an Arxan company and provider of mobile application management (MAM) and security solutions, has announced several platform enhancements, which increase the security of enterprise mobile app data. These updates take advantage of native device capabilities, multiple industry protocols and additional password controls, to provide a solution for distributing secu...
Why runtime application selfprotection is critical for app security
Tuesday, June 20, 2017 by David Strom
Today most of us go about implementing security from the outside in. The common practice is to start by defining a perimeter and trying to defend it with various security tools. Even though perimeters have been porous for more than a decade, we still can’t give up this notion that if we build a better wall we can keep our enterprises safer.Certainly that is where most e...
The Netflix hack: A chat about securing your company
Wednesday, May 10, 2017 by Richard Harris
As the digital transformation progresses onwards, the unfortunate side effects are becoming blatantly obvious in the news. It seems like every other day that some new big box company, political party, or individual has their information compromised. But even though only the few biggest companies get the real media attention, hundreds of millions of hacking attempts are ...
Instart Logic brings Helios AIDriven security out into the open
Friday, April 28, 2017 by Richard Harris
In ancient mythology, Helios was the Greek god of the sun streaking across the heavens in a chariot shining much-needed light onto a dark and dangerous world. That’s exactly what Instart Logic, is doing with their latest announcement of Helios - "using artificial intelligence to illuminate and solve today’s most challenging digital security issues."Web application attac...
CloudBees Jenkins Enterprise announced
Monday, February 27, 2017 by Richard Harris
CloudBees, Inc. announced the availability of CloudBees Jenkins Enterprise to help enterprises accelerate software delivery and meet the rapidly growing volume of software development. Every company in every industry is dependent on software to support strategic initiatives and competitive differentiation. To support this business imperative, IT departments are ado...
Capsule8 comes out of stealth to help protect Linux from attacks
Wednesday, February 15, 2017 by Christian Hargrave
Capsule8 has emerged from stealth mode to unveil its plans for the industry’s first container-aware, real-time threat protection platform designed to protect legacy and next-generation Linux infrastructures from both known and unknown attacks. Founded by experienced hackers John Viega, Dino Dai Zovi and Brandon Edwards, Capsule8 is being built on the real-world experien...
Enterprise BYOD post holiday woes
Tuesday, January 24, 2017 by Mitch Black
Bring Your Own Device (BYOD) programs are a constant enterprise challenge. For unprepared organizations, the holidays can be especially difficult.Christmas to New Year’s Day is typically a peak time to purchase and/or download apps, so how can your enterprise effectively enroll an influx of new users and devices without compromising program security? While the recent ho...
8 cyber security predictions for what's to come in AsiaPacific
Thursday, December 29, 2016 by Christian Hargrave
Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...
PMR's report on the global SecurityasaService market
Monday, December 19, 2016 by Christian Hargrave
Adopting the business model of Security-as-a-Service (SaaS) has become a pragmatic choice for companies looking at integrating security with their business infrastructure. Furthermore, emerging technological trends related to the Internet of Things (IoT) and cloud-computing will continue to compel more businesses towards implementation of a Security-as-a-Service busines...
What an advanced threat approach for cloud security must address
Wednesday, December 14, 2016 by Christian Hargrave
Headlines about hacking and malware prove that traditional security methods are not up to the task of protecting organizational infrastructures and data from theft and ransomware. As more organizations embrace cloud-first platforms for everything from customer relationship management (CRM) to enterprise resource planning (ERP) platforms and beyond, they place themselves...
Core Security is making the password reset process selfservice, faster and simpler
Wednesday, November 30, 2016 by Richard Harris
Core Security announced the release of Core Mobile Reset 1.0 and Core Access Insight 9.2. With the introduction of these solution updates, enterprise security teams will now be able to resolve immediate threats with prognostic analytics applied to the big identity and access data, while also enhancing organizational efficiency.Ineffective password management i...
Intel Security Enhances Unified Defense Architecture
Thursday, November 3, 2016 by Richard Harris
Intel Security has announced an enhanced unified defense architecture designed to empower organizations to more effectively protect a new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where ...
LUA, NodeJS, Ruby, and Go get open source enterprise support from ActiveState
Tuesday, November 1, 2016 by Richard Harris
ActiveState, the open source languages company, has announced the upcoming release of ActiveRuby, ActiveNode, ActiveGo, and ActiveLua. These new releases will include free community versions for the open source community, plus pre-compiled, tested, professional distributions for enterprise users. Enterprise users will also benefit from commercial support, indemnificati...