Protecting source code
Wednesday, October 6, 2021 by Nigel Thorpe
Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...
Quantum computing company receives over $9M in funding
Thursday, August 26, 2021 by Richard Harris
Quantum Brilliance, a venture-backed Australian-German full-stack quantum accelerator startup, has announced closing a USD$9.7 million seed investment co-led by the QxBranch founders’ and Main Sequence investment consortium.
Quantum Brilliance harnesses synthetic diamonds to build quantum accelerators that do not require near absolute zero temperature or comple...
Six areas of focus for continuous security
Friday, April 16, 2021 by Jack Mannino
Applications are the heart of employee and user productivity. There are billions of applications each with a specific function and value and, unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the conce...
Low power cellular IoT chipset launched by Sony
Thursday, February 25, 2021 by Brittany Hainzinger
Sony Semiconductor Israel (Sony) announced the launch of the Altair ALT1255, a new low-power NB2 chipset. The ALT1255 is 5G ready, designed with an integrated SIM (iSIM), user MCU, rich application layer, and GSM/GPRS fallback modem.
The ALT1255 chipset empowers device manufacturers to develop low-power, cost-sensitive connected devices at a global scale to mo...
DevSecOps will go mainstream this year
Tuesday, January 26, 2021 by Richard Harris
To encrypt or not encrypt legacy devices no longer a choice
Thursday, March 19, 2020 by Freeman Lightner
Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...
Linux Foundation open sources Project OWL
Tuesday, March 10, 2020 by Richard Harris
The Linux Foundation announced Project OWL’s IoT device firmware effort will be hosted at the Foundation and is inviting developers worldwide to build mesh network nodes for global emergency communications networks. Project OWL, the winner of Call for Code 2018, is a cloud-based analytics tool that helps facilitate organization, whereabouts, and logistics for disa...
Ushur Managed Package launched on Salesforce AppExchange
Thursday, February 20, 2020 by Brittany Hainzinger
Ushur announced it has launched the Ushur Managed Package on Salesforce AppExchange, empowering enterprises to add customer engagement automation capabilities to their Salesforce platform. Ushur’s artificial intelligence (AI) platform enables enterprises to instantly and intelligently automate interactions with their customers, integrating directly into Sale...
Adjust to launch Control Center as part of Automate Suite
Tuesday, February 18, 2020 by Freeman Lightner
Adjust announced the launch of its pioneering new product, Control Center, which will be part of the Adjust Automate suite. With its release, Adjust aims to dramatically simplify the process of mobile advertising management for today’s marketers.
Mobile has become the new undisputed king of digital, and eMarketer predicts marketers are poised to invest a record...
Dangers of quantum hacking
Tuesday, February 11, 2020 by Richard Harris
Active Cypher has built a password-hacking quantum computer to demonstrate the dangers of quantum hacking.
Using $600 worth of hardware parts easily purchased online or at a local electronics store, Active Cypher’s founder and CTO, Dan Gleason, created a portable quantum computer dubbed QUBY (named after qubits, the basic unit of quantum information). QUBY runs...
Post-quantum computing security
Wednesday, November 6, 2019 by Richard Harris
There is a brewing fear about Quantum computing because of the power behind moving quantum bits around in such blinding speeds that some say, will instantly break every encryption algorithm on the Internet today. DigiCert Inc. has released the results of a new survey titled, "Quantum's Peril & Promise" that highlights the ...
Two strategic advisors join Findora
Friday, August 16, 2019 by Richard Harris
Findora, the cryptographically transparent public blockchain for building decentralized financial applications, has two new strategic advisors; Balaji Srinivasan, former CTO of Coinbase, and Professor Dan Boneh, Head of Stanford Cryptography.
Prior to joining Coinbase, Srinivasan was General Partner at Andreessen Horowitz, and co-founder of Earn.com,&...
Warnings for aircraft cybersecurity
Thursday, August 1, 2019 by Brittany Hainzinger
The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...
API security testing just got easier with 42Crunch's new scanner
Thursday, March 21, 2019 by Richard Harris
42Crunch officially released the 42Crunch API Platform, an API security cloud platform to discover vulnerabilities in APIs and protect them from attack. The 42Crunch Platform can protect SaaS, Web, or IoT APIs, as well as microservices.
This follows the launch of the free API Contract Security Audit tool at APISecurity.io earlier this month. The tool helps API d...
Data science and the currency of the future
Wednesday, February 6, 2019 by Richard Harris
A recent study performed by IDC and Seagate forecasted that by 2025, global data will grow to 163 zettabytes. For scale, that’s approximately 1 trillion gigabytes per zettabyte. As the amount of available data grows, businesses are clamoring for larger and larger pieces of the pie. However, when it comes to leveraging data, success doesn’t rest on the quanti...
Wireless Gecko portfolio cuts WiFi power consumption in half
Monday, January 28, 2019 by Richard Harris
Silicon Labs expands its groundbreaking Wi-Fi portfolio of modules and transceivers, enabling developers to create end node products with best-in-class power efficiency, superior RF blocking performance and advanced security. Designed for the specific needs of IoT applications, the Wireless Gecko portfolio cuts Wi-Fi power consumption in half compared to competitive off...
Gamification can transform your software security program
Tuesday, December 18, 2018 by Pieter Danhieux
No matter the organization, or indeed their individual circumstances, there is one problem I have identified time and time again over the course of my career: AppSec managers, CISOs, CIOs and cybersecurity experts all over the world are rarely able to positively engage their dev teams on security best practice and training. It’s a source of conflict between teams,...
ALM data strategies that mimic the principles of blockchain
Friday, November 2, 2018 by Christopher Pola
All too often, I hear from customers about a very common pain point: they do not have the data to run their business. It’s not that they lack data, but they lack trust in their data. While solving data issues can be a riddle at times, I believe this dilemma is symptomatic of antiquated and/or misappropriated application lifecycle management (ALM) systems requiring...
Machine learning, crowdsourced data, and the birth of Gengo.ai
Wednesday, October 31, 2018 by Richard Harris
The glue that holds machine learning and artificial intelligence together is data. Without the data to create complex learning algorithms from, and to create those life-like AI experiences - neither of them are worth a brass farthing.
Charly Walther, the VP of product and growth at Gengo.ai, joined Gengo from Uber, where he was a product manager in Uber’s Advan...
DuckDuckGo vs. Google vs. Privacy
Friday, October 19, 2018 by Richard Harris
Online privacy is becoming harder to find - Facebook gathers users’ data to sell to third parties, Google tracks everyone’s searches, ISPs in many countries gather communication data, and governments are increasingly demanding backdoor access to encrypted devices. In the latest news, Google exposed the data of 500,000 Google+ users and didn’t...
Blockchain IoT can work to your advantage
Friday, October 5, 2018 by Richard Harris
Why do the words Blockchain and IoT still sound terrifying to some businesses? Maybe it's because Blockchain terminology was made mainstream by Bitcoin, or perhaps it's that IoT sounds immediate security alarms.
According to IBM, using Blockchain in asset management, customs declarations, supply chain networks, commercial property leasing, and countless more ...
Presidential Alerts and the future of mobile communication
Thursday, October 4, 2018 by Richard Harris
FEMA has sent their first emergency test message to all of the mobile devices throughout the United States. They reported every American who owns a smartphone - which is about 75% of the population, should have received the test alert. In total the message went out to a total of 225 million devices right around 1:18 PM CST reading "Presiden...
Top ten ICO scams that swindled over $687M
Friday, September 28, 2018 by Richard Harris
Initial Coin Offerings are one of the most tempting investment options for those hoping to profit from the ever-evolving world of cryptocurrency. However, the lack of regulation has allowed ICO investors to become targets of sneaky schemes.
Though ICOs have snowballed, with more than 750 being invested in during 2018 alone, the number of scams has also steadily risen...
Decentralized application development boosted with Lisk Core 1.0
Thursday, August 30, 2018 by Richard Harris
Merged mining partnership between Bitmain and Elastos
Tuesday, August 28, 2018 by Christian Hargrave
Elastos (ELA) announced a merged mining partnership with Bitmain Technologies. The merged mining partnership means that for miners and future users of the smart web platform, it guarantees the security of the Bitcoin network by sharing its hashpower. Merged mining allows Bitcoin (BTC) and the ELA coin to be mined simultaneously and more efficiently, and conserves energy...
A quantum blockchain can stop quantum computing from hacking it
Monday, August 13, 2018 by John Wu
We have yet to see the full promise of Blockchain play out but companies and scientists are already close to launching a technology that could theoretically break it: quantum computers.
Such machines can compute data exponentially faster than traditional computers. Earlier this year, Google began testing Bristlecone, a quantum computer chip that its creators think wi...
Questioning the future of privacy and the safety of personal identity
Thursday, June 28, 2018 by Richard Harris
While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR.
These findings and more are outlin...
New partnership emerges to simply IoT security
Wednesday, May 16, 2018 by Richard Harris
In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...
CEO Roundtable participants announced for Telecom Exchange NYC 2018
Wednesday, May 9, 2018 by Christian Hargrave
Jaymie Scotto & Associates (JSA), founder and host of the C-Level networking event series, the Telecom Exchange (TEX), announced its CEO Roundtable participants and topics for its 2018 TEX NYC event, taking place June 19-20 in Hoboken, NJ. The event will feature four CEO Roundtables, providing a major platform for tech, telecom and content thought leaders to deliber...
This API api security solution to use AI
Thursday, February 1, 2018 by Richard Harris
To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...
How to protect IP communications from telecom fraud
Thursday, December 28, 2017 by William King
Software-based IP communications continue to grow in popularity because of the added reliability, reach and control they allow businesses to have over their telecom resources. However, as more developers continue to transfer enterprise communications from legacy telcos to cloud-based service providers, the threat of telecom fraud and cyber-attacks also rise. Accord...
Making a mobile game that sticks this season
Wednesday, December 27, 2017 by Nelson Rodriguez
‘Tis the season to be gaming. With dozens of new titles expected to hit the shelves, app stores and console and PC marketplaces this holiday season, it’s critical that developers level up their strategies for a successful game launch to earn a hefty slice of this year’s holiday gaming sales pie.After building a terrific game, a successful holiday launch hinges on provid...
DevSecOps is important and here is why
Friday, October 20, 2017 by Richard Harris
In the digital age, securing your development projects against malicious hackers can be quite the challenge. And when you take security and try to scale security to an enterprise, the challenge seems insurmountable. Evident by the frequent hacking incidents we see come through the news.Enter DevSecOps. DevSecOps is a methodology that interweaves the aspects of DevOps an...
Sending out an S.O.S. for SMS
Wednesday, October 4, 2017 by Will LaSala
What a difference a year makes. Just one year after the National Institute of Standards and Technology issued guidance that found SMS is insecure and no longer suitable as a strong authentication mechanism, it has walked all of that back.At the time the original draft was published, it was highly unusual for any US government agency to get out in front of the security i...
Behavioral and biometric mobile authentication will end passwords
Friday, September 15, 2017 by David Vergara
You can say this about passwords: they're incredibly resilient. Not in a bulletproof kind of way but, more precisely, in terms of how long they've been around. According to Robert Svensson in his book "From Hacking to Report Writing: An Introduction to Security and Penetration," the first computer system to use passwords was built by researchers at the Massachusetts Ins...