AWS introduces Mithra advanced threat intelligence neural network
Thursday, August 15, 2024 by Freeman Lightner
In a recent blog post from AWS, Amazon Chief Information Security Officer CJ Moses detailed the robust threat intelligence capabilities that safeguard AWS customers. Through tools like Mithra and MadPot, AWS collects and analyzes vast data, identifying and neutralizing threats with unparalleled accuracy and speed. AWS's proactive approach to sharing high-fidelity th...
NHS 11 attack: What we learned
Friday, August 19, 2022 by Freeman Lightner
Databarracks provides secure Disaster Recovery, Backup, and Business Continuity solutions in the UK. Chris Butler is the Head of Databarracks' Resilience and Continuity Consulting practice, a fellow of the Institute for Leadership and Management, a Member of the Business Continuity Institute, and a Certified Information Security Manager. But...
Software cyberattack predictions for 2022
Tuesday, January 4, 2022 by Richard Harris
Nigel Thorpe hails from a software development background and moved to the IT security industry with Entrust Technologies during the early days of PKI. His knowledge has benefited a number of security companies in the UK, Canada, and the USA, and he now serves as Technical Director at SecureAge Technology. With a wide range of experience in different business environmen...
Offshore software developers risks and advantages
Thursday, October 28, 2021 by Vivien F. Peaden
The onset of COVID-19 has hastened CEOs’ prioritization of digital transformation to future-proof their organizations. This paradigm change is driving the IT outsourcing spend to improve operational agility, integrate new technologies, and achieve cost-savings and faster time-to-market.
Risks and advantages of using offshore software developers
The pandemic ...
Vanta launches Automated ISO 27001 Certification and HIPAA Compliance
Tuesday, July 13, 2021 by Brittany Hainzinger
Vanta announced public availability for two new certification standards that help secure the internet and protect consumer data. Vanta provides automated compliance audits and continuous security monitoring through a robust SaaS platform, enabling companies to achieve industry standardization in weeks instead of months.
The rise of data leaks and privacy concerns hav...
Justin Dolly becomes Chief Security Officer at Sauce Labs
Wednesday, February 12, 2020 by Brittany Hainzinger
Sauce Labs Inc. announced the appointment of Justin Dolly as chief security officer. A security industry veteran with more than 20 years of experience, Dolly will develop, implement, and enforce the company’s long-term security strategy, ensuring its customers have the highest level of protection to support their digital goals. The hiring of Dolly follows the rece...
Data Privacy Day 2020 is here
Tuesday, January 28, 2020 by Richard Harris
Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure.
Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...
FTC cracks down on comprehensive data security for Utah company
Thursday, November 14, 2019 by Richard Harris
A Utah-based technology company has agreed to implement a comprehensive data security program to settle Federal Trade Commission allegations that the company failed to put in place reasonable security safeguards, which allowed a hacker to access the personal information of a million consumers.
InfoTrax Systems, L.C., provides back-end operation services to multi-leve...
Top 10 developer technologies in 2019
Thursday, October 24, 2019 by Richard Harris
Pluralsight, Inc. announced that it has expanded its Technology Index tool to address the most in-demand technologies for IT operations, information security, and data professionals in addition to the previously existing ranking of top in-demand software developer languages.
In-demand technologies according to Technology Index
Pluralsight's expanded ...
Crowdsourced security and bug bounty adoption is spreading
Monday, May 20, 2019 by Richard Harris
There continues to be a fundamental imbalance in cybersecurity. Attackers are finding new ways to penetrate cyber defenses as targets proliferate to the cloud, mobile, and connected devices. Defenders need to take a proactive security approach.
The evolving threat landscape and the ever-widening security skills gap are giving rise to new approaches such as crowdsourc...
Women are using financial apps more than men says Liftoff report
Friday, April 12, 2019 by Brittany Hainzinger
Liftoff released a new report in partnership with Leanplum uncovering new insights into the world of mobile finance. Specifically, it found that women are more engaged than ever with finance apps, meaning it’s prime time for marketers to double-down on investments in the traditionally underserved demographic. The report also shows the Asia-Pacific region (APAC) co...
Windows 10 security hygiene is a priority for many says new report
Wednesday, September 26, 2018 by Austin Harris
Adaptiva announced the results of its 2018 Enterprise Endpoint Security Survey. The survey showed that security is galvanizing around the move to Windows 10, the operating system that the majority of companies surveyed now run in their organizations. In the survey, over half of respondents indicated that security hygiene is a priority, listing security configuration man...
IoT security standards to come with Sprint Curiosity IoT
Tuesday, September 18, 2018 by Richard Harris
Sprint has unveiled the Curiosity IoT platform, a new standard in how IoT is managed and secured. Enterprises will now be able to manage IoT devices and connectivity over the air across multiple SIM profiles. Intelligence from device data will be generated instantly through the dedicated, distributed and virtualized core, built together with the new operating system. An...
National Coding Week is here
Monday, September 17, 2018 by Richard Harris
National Coding Week is upon us. That's why we thought it would be great to compile some quotes from industry experts to talk about what they think is most important about learning how to coding - a question seen through many different lenses.
“Today, software drives business. So, if an organization wants to excel, it needs to become a software-powered jugg...
Merged mining partnership between Bitmain and Elastos
Tuesday, August 28, 2018 by Austin Harris
Elastos (ELA) announced a merged mining partnership with Bitmain Technologies. The merged mining partnership means that for miners and future users of the smart web platform, it guarantees the security of the Bitcoin network by sharing its hashpower. Merged mining allows Bitcoin (BTC) and the ELA coin to be mined simultaneously and more efficiently, and conserves energy...
Data masking report finds GDPR is pressing the need for solutions
Thursday, August 23, 2018 by Austin Harris
Dataguise has been recognized in a new report on data masking by Gartner titled, Market Guide for Data Masking. As data growth continues and data analytics becomes a mission-critical operation throughout the enterprise, Dataguise has been supporting the need to protect sensitive information in the wake of new data privacy regulations such as the General Data Protec...
Stony Brook University gets $25M for new engineering program
Wednesday, August 22, 2018 by Austin Harris
Senate Majority Leader John Flanagan (2nd Senate District) and Chairman of the Senate’s Higher Education Committee Kenneth LaValle (1st Senate District) announced the award of $25 million in funding to Stony Brook University that will enable the university to begin the initial phases for developing a new engineering building on campus. The funding will enable Ston...
NodeSource pricing tier has changed
Thursday, August 16, 2018 by Austin Harris
NodeSource announced the release of a new, integrated product platform. Teams can now benefit from a more cohesive set of solutions for Engineering and DevOps, as well as a more streamlined user experience. This release also marks the first time NodeSource has offered a free-forever pricing tier, targeted at individual developers or those working on small projects. An a...
Information security event Black Hat USA celebrates 21 years
Tuesday, August 14, 2018 by Austin Harris
Black Hat has highlighted their 2018 event programming and new initiatives that will help make Black Hat USA 2018 its most successful show to date. The event welcomed nearly 19,000 of the most security-savvy professionals across the InfoSec spectrum - spanning academia, world-class researchers, and leaders in the public and private sectors. The event’s robust line...
Questioning the future of privacy and the safety of personal identity
Thursday, June 28, 2018 by Richard Harris
While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR.
These findings and more are outlin...
CEO Roundtable participants announced for Telecom Exchange NYC 2018
Wednesday, May 9, 2018 by Austin Harris
Jaymie Scotto & Associates (JSA), founder and host of the C-Level networking event series, the Telecom Exchange (TEX), announced its CEO Roundtable participants and topics for its 2018 TEX NYC event, taking place June 19-20 in Hoboken, NJ. The event will feature four CEO Roundtables, providing a major platform for tech, telecom and content thought leaders to deliber...
Stop the menace of Android rooting malware attacks with RASP
Monday, September 25, 2017 by Frederik Mennes
One of the key security issues facing organizations that support Android devices is the risk of rooting malware. A number of malware families on the Android mobile OS attempt to obtain root access once installed because the elevated privileges gained come in handy to perform malicious activities.
What you need to know about Tordow v2.0 and Pegasus
The To...
The future of cybersecurity in machine learning
Sunday, July 30, 2017 by Richard Harris
McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...
Humans are still the biggest threat to cyber security report shows
Saturday, December 17, 2016 by Austin Harris
Global technology company Nuix have released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behavior was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective ...
DevOps Enterprise Summit Returns to San Francisco in November
Thursday, August 18, 2016 by Stuart Parkerson
The DevOps Enterprise Summit 2016 will provide a DevOps conference focusing on the challenges large, complex organizations face in implementing DevOps principles and practices. The event will be held November 7 - 9, 2016 at the Hilton San Francisco Union Square and will feature presentations from Fortune 1000 brands that leverage DevOps with event programming that ...
Don't Expect Apple and Google to Do App Security for You
Tuesday, May 24, 2016 by Sinan Eren
The appetite for mobile apps with an appealing user experience shows no signs of slowing – even in closely regulated industries such as financial services and healthcare. In fact, according to Gartner, by the end of 2017, IT organizations will be hard-pressed to meet market demand for mobile app development services as it grows at least five times faster than IT’s abili...
Five Common Mobile App Security Vulnerabilities And How to Fix Them
Saturday, April 30, 2016 by Seth Jaslow
Mobile app security leaves much to be desired. That was the conclusion of a 2016 Hewlett Packard Enterprise (HPE) study which found that a staggering 96 percent of 36,000 mobile apps failed at least one of 10 privacy checks. Three years ago, a similar HPE study found that 97 percent of 2,000 apps reviewed held insecure private information. As mobile app usage conti...
Breaking Down the Essential Elements for DevOps Success
Thursday, January 21, 2016 by Stuart Parkerson
We recently visited with Michael Madden, CA Technologies General Manager - DevOps, to tap into his expertise and insight into how companies can realize the full potential of adopting a DevOps Mentality. ADM: What is the difference between DevOpsSec, Secure DevOps and Rugged DevOps?Madden: There are many definitions around each of these movements, but fundamentally ...
New Report Highlights Wide Ranging Cybersecurity Challenges
Wednesday, September 2, 2015 by Richard Harris
Cybersecurity Ventures has released its Cybersecurity Market Report for Q3 2015 which provides an overview of software development and application security trends, statistics, best practices, and resources. Highlights of the report include:- “The SANS Institute 2015 State of Application Security Report” states that many information security engineers don’t understa...
GE's Predix Cloud to Usher in a New Era for Industrial Data and Analytics
Monday, August 10, 2015 by Stuart Parkerson
GE is entering the cloud services market with Predix Cloud, a cloud solution designed specifically for industrial data and analytics. Predix Cloud is offered as a platform-as-a-service (PaaS) to help companies capture and analyze large volumes, velocities and varieties of machine data within a highly secure, industrial-strength cloud environment. Predix Cloud will ...
Enterprise Mobile QA with Ranjeet Vidwans VP of Marketing for Mocana
Tuesday, February 24, 2015 by Richard Harris
We recently sat down with Ranjeet Vidwans, VP of Marketing for Mocana, to discuss challenges facing companies with the implementation of an enterprise mobile strategy.ADM: What do you see as the major differences between an enterprise mobile app and a consumer mobile app? Vidwans: Interestingly, there are probably more important fundamental similarities ...
Technology Execs Say Mobile and Cloud Revenues Are Surging with Data and Analytics Expected to Provide the Greatest Revenue Growth Opportunities
Wednesday, June 18, 2014 by Richard Harris
Mobile and Cloud revenues are surging, according to the results of the annual Technology Business Outlook survey of U.S.-based technology executives conducted by KPMG. The report shows in part these executives believe data and analytics (D&A) are expected to be the top revenue growth driver over the next two years. At the same time, security is projected to become a...
ESG Defines the Market for Big Data Security Analytics
Friday, May 31, 2013 by Richard Harris
Leading analyst firm publishes report on information security analytics toolsMilford, Mass - May 21, 2013 - A new report examining the supply side of big data security analytics has been published by Enterprise Strategy Group (ESG), a leading IT research, analysis, and strategy firm. The report defines the market for big data security analytics and gauges existing solut...