NetLib Security predictions 2025
Thursday, January 2, 2025 by Richard Harris
The leading prediction for 2025 will sound familiar: Generative AI directly affects your privacy rights. In many ways, this is a twist on the typical cybersecurity problem. Rather than a hacker or a bad actor breaking in to steal your data, we are being asked to hand our keys to the companies we often trust the most: Microsoft, Apple, Dropbox, and Google!
NetLib Secu...
DevOps threats report released from GitProtect io
Monday, August 12, 2024 by Brittany Hainzinger
Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities,
and, as a result, data loss are the reality that DevSecOps teams have to face...even every
few days.
The State of DevOps threats report - teams affected every few days
GitProtect.io recently presented its studies on the most severe incidents affecting tools like GitHub...
AI changing how developers code and how companies hire developers
Monday, May 8, 2023 by Freeman Lightner
HackerRank released a new report on the state of AI-related coding skills and found that the nature of a developer's work is quickly evolving to keep up with advancements in Artificial Intelligence. As a result, how companies find, hire, and upskill developers must also change to match this emerging reality.
HackerRank surveyed more than 42,000 global developers ...
Developers and brands must make mobile apps far more secure
Tuesday, January 17, 2023 by Austin Harris
The bad guys are still breaking digital windows and kicking down digital doors, so to speak, and will continue well into 2023 and beyond!
Consumers through experience or gut instinct will demand that their mobile app providers deliver key security features including trying to stop the increasingly prevalent "man-in-the-middle" attacks. The latest techn...
Apex Legends Mobile Hyperbeat event
Tuesday, August 23, 2022 by Freeman Lightner
EA and Respawn Entertainment are pleased to announce a brand new event for Apex Legends Mobile. The Hyperbeat event launched with lots of hot new features to explore. In addition to the arrival of Legend Crypto, the Hyperbeat event also included a brand new ranked split, new events, a new Battle Pass, and updates to core systems.
Hyperbeat event updates
Fans ...
Promon partners with F5 to simplify mobile SDK integration
Wednesday, October 27, 2021 by Austin Harris
Promon, the Oslo-based app security company announced its partnership with F5, the multi-cloud application security and delivery company. This partnership now enables F5's customers to seamlessly implement the F5 Bot Defense Mobile SDK. The solution provides developers with the necessary tools to protect their applications from bot attacks utilizing Promon'...
Advanced digital fingerprinting capabilities from SEON
Monday, October 25, 2021 by Freeman Lightner
SEON, the fraud fighters, have unveiled modern digital device fingerprinting capabilities designed to identify and counter the latest internet and mobile fraud tactics used by sophisticated fraudsters and bots.
Advanced digital fingerprinting capabilities
Fraudsters increasingly use unusual device setups to speed their efforts. Device fingerprinting can ...
Protecting source code
Wednesday, October 6, 2021 by Nigel Thorpe
Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...
SnykCon 2021 event lineup
Friday, September 24, 2021 by Randall Degges
We're only a few weeks away from SnykCon 2021, Snyk's free annual developer conference that helps you learn how to build applications securely running October 5-7. We have a packed agenda full of expert talks, hands-on workshops, helpful demos, product roadmaps, opportunities to interact with some of the smartest speakers and leaders of developer security i...
Tech hiring surges in 2021
Wednesday, August 25, 2021 by Brittany Hainzinger
Tech job postings increased 16% in the second quarter of 2021, with locations, occupations, skills, and employers across the country experiencing strong quarter-over-quarter growth, according to the Q2 2021 Tech Job Report from Dice, a DHI Group, Inc. brand (NYSE: DHX).
Nationwide tech hiring surges in the second quarter of 2021
...
Network visibility improves with Endace and Kemp Technologies
Tuesday, August 24, 2021 by Brittany Hainzinger
Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy.
Network visibility improves, helping teams reduce incident response times
The enhanced network flow metadata generation and intelligent traffic mon...
Faster customer integrations from HackerOne
Thursday, July 29, 2021 by Freeman Lightner
Tray.io has announced that HackerOne is using Tray Embedded to develop and deliver powerful customer integrations at scale. With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce the integration maintenance burden. Armed with seamless integrations, HackerOne customers can spend less time context-switching...
Not all security vulnerabilities are created equal
Tuesday, May 25, 2021 by Jack Mannino
Applications are the heart of employee and user productivity. There are billions of applications each with a specific function, value and, unfortunately, they also provide one of the easiest openings for cybercriminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the concept o...
Six areas of focus for continuous security
Friday, April 16, 2021 by Jack Mannino
Applications are the heart of employee and user productivity. There are billions of applications each with a specific function and value and, unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the conce...
Denuvo has joined the PlayStation 5 Tools and Middleware program
Wednesday, March 10, 2021 by Brittany Hainzinger
As security and innovation collide, Denuvo by Irdeto announces it has joined the exclusive PlayStation®5 Tools and Middleware program. Denuvo offers its Anti-Cheat solution through this program to publishers and developers whose games are available on PlayStation®5.
Denuvo is at the forefront of games security with over 2 billion unique game installs pro...
DevSecOps will go mainstream this year
Tuesday, January 26, 2021 by Richard Harris
Cybercriminals love Shadow Code exploits because hacking a commonly used library or service can place the malicious code on hundreds or thousands of websites. For example, the widely used jQuery JavaScript library has been breached multiple times, leading to digital skimming attacks broadly across the e-commerce sector. Adding jQuery to an application without ...
5 mistakes businesses make in application development
Friday, October 23, 2020 by Mayur S Shah
5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development
Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...
HackNotice announces threat intelligence platform
Friday, September 18, 2020 by Brittany Hainzinger
HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...
Datagran launches no-code platform
Tuesday, July 14, 2020 by Brittany Hainzinger
Datagran introduced its flagship platform. Designed to empower developers and growth hackers within data intensive companies, the Datagran platform allows companies to accelerate time-to-market for existing and new products and reduce the total number of tools needed to meet their business goals - without the need to write code and build APIs.
Many companies today ar...
Epic Games partners with Fortumo to launch carrier billing
Tuesday, June 9, 2020 by Brittany Hainzinger
The video game and software developer and publisher Epic Games and the mobile technology company Fortumo are announcing the launch of a carrier billing partnership. Epic Games has integrated Fortumo’s carrier billing platform to collect payments for Fortnite Battle Passes, game purchases in the Epic Games Store and other Epic Games content.
The first country wh...
Postal.io redefines offline B2B marketing
Tuesday, May 5, 2020 by Brittany Hainzinger
Offline sales and marketing engagement is being redefined by Postal.io, particularly in today’s era of social distancing and remote work brought about by the global coronavirus pandemic. Ushering in a new era of capability and control, Postal’s sales and marketing automation platform enables enterprise B2B companies to effectively manage offline marketing pr...
Developer survey report from HackerEarth
Monday, May 4, 2020 by Brittany Hainzinger
HackerEarth released its first-ever developer survey report titled “Behind the Code: HackerEarth Developer Survey 2020.” The report gives employers and recruiters a look into the minds and motivations of today’s most hard-to-recruit and highly coveted talent and provides developers with insights on upskilling and career development.
The survey resul...
One Identity Safeguard now supports Microsoft SQL Server
Friday, May 1, 2020 by Brittany Hainzinger
One Identity announced that its One Identity Safeguard solution now supports Microsoft SQL Server 2017 and SQL Server 2019 database environments. Microsoft was positioned as a Leader in the 2019 Gartner Magic Quadrant for Operational Database Management Systems*. With One Identity Safeguard, organizations can for the first time securely manage, monitor, record and audit...
To encrypt or not encrypt legacy devices no longer a choice
Thursday, March 19, 2020 by Freeman Lightner
Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...
Dangers of quantum hacking
Tuesday, February 11, 2020 by Richard Harris
Active Cypher has built a password-hacking quantum computer to demonstrate the dangers of quantum hacking.
Using $600 worth of hardware parts easily purchased online or at a local electronics store, Active Cypher’s founder and CTO, Dan Gleason, created a portable quantum computer dubbed QUBY (named after qubits, the basic unit of quantum information). QUBY runs...
Microsoft DART team tracks 77k active web shells
Thursday, February 6, 2020 by Brittany Hainzinger
In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers.
According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...
StrandHogg Android vulnerability identified
Thursday, December 5, 2019 by Freeman Lightner
Promon, a Norwegian app security company, has identified tangible evidence of a dangerous Android vulnerability that allows malware to pose as any legitimate app, granting hackers access to private SMS’ and photos, steal victims’ log-in credentials, track movements, make and/or record phone conversations, and spy through a phone’s camera and microphone...
Threat of quantum computing hackathon to award $100,000
Monday, November 25, 2019 by Richard Harris
Communique Laboratory Inc. launched its quantum hackathon tackling the threat of quantum computing. Cybersecurity companies, computer science students and hackers have begun challenging the Company’s ‘quantum-safe’ encryption in a $100,000 hackathon.
The Company hosted an innovation celebration event with technology presentations from industry...
API Manager 3 from WSO2 released
Monday, November 18, 2019 by Richard Harris
APIs are the essential building blocks of digital businesses—assembling data, events and services from within the organization, throughout ecosystems, and across devices. This is driving new demands for organizations to create and monetize APIs and API products; maximize adoption and reuse across internal and external portals and API marketplaces; and ensure API s...
FTC cracks down on comprehensive data security for Utah company
Thursday, November 14, 2019 by Richard Harris
A Utah-based technology company has agreed to implement a comprehensive data security program to settle Federal Trade Commission allegations that the company failed to put in place reasonable security safeguards, which allowed a hacker to access the personal information of a million consumers.
InfoTrax Systems, L.C., provides back-end operation services to multi-leve...
How to hire top technical talent
Monday, October 28, 2019 by Richard Harris
We recently spoke with Maria Chung, VP of People at HackerRank about hiring technical talent. HackerRank is a technology hiring platform that is the standard for assessing developer skills for over 1,500+ companies around the world. The current methods for technical interviewing fall flat when it comes to showcasing a candidate’s true skills. By enabling...
What Render announced at TechCrunch Disrupt SF's Startup Battlefield
Thursday, October 3, 2019 by Freeman Lightner
Render announced three major additions to its platform - Disks, Infrastructure as Code in the form of render.yaml and Deploy To Render button - onstage at TechCrunch Disrupt SF’s Startup Battlefield. Startup Battlefield showcases the most promising early-stage and fundamentally disruptive startups.
When it comes to hosting applications in the cloud, developers ...
IBM's z15 launches with Data Privacy Passports
Friday, September 13, 2019 by Freeman Lightner
Against a backdrop of global privacy breaches, with the cost of each security breach in the U.S. clocking in on avg $8.2 million, IBM launched "z15", the enterprise platform that delivers the ability to fully manage the privacy of customer data across hybrid and multi-cloud environments.
As part of the launch, IBM is announcing Data Privacy Passports, ...
INTUITION.DEV wants to help developers survive the coming tech crash
Tuesday, August 20, 2019 by Richard Harris
Hacker News announced the release of a first working version of INTUITION.DEV. INTUITION.DEV is a completely free and open source low-code tool specifically designed for professional developers, not citizen developers.
Bubble (a commercial low-code tool for citizen-developers) estimated savings of ten to 50 times on traditional development costs through low-code, and...
AIPowered protection for APIs
Thursday, June 20, 2019 by Richard Harris
The proliferation of APIs catalyzed by digital transformation initiatives is viewed as a virtual goldmine by hackers, who are hijacking tokens, cookies and keys, as well as targeting weaknesses in individual APIs. And all too often, static security controls fail to stop these attacks. Now, WSO2 and Ping Identity have partnered to protect APIs against cyber-attacks by co...