information security

information security news search results

Developer news items we found relating to information security

26 results
FTC-cracks-down-on-comprehensive-data-security-for-Utah-company

FTC cracks down on comprehensive data security for Utah company


Thursday, November 14, 2019 by

A Utah-based technology company has agreed to implement a comprehensive data security program to settle Federal Trade Commission allegations that the company failed to put in place reasonable security safeguards, which allowed a hacker to access the personal information of a million consumers. InfoTrax Systems, L.C., provides back-end operation services to multi-leve...


Top-10-developer-technologies-in-2019

Top 10 developer technologies in 2019


Thursday, October 24, 2019 by

Pluralsight, Inc. announced that it has expanded its Technology Index tool to address the most in-demand technologies for IT operations, information security, and data professionals in addition to the previously existing ranking of top in-demand software developer languages. In-demand technologies according to Technology Index Pluralsight's expanded ...


Crowdsourced-security-and-bug-bounty-adoption-is-spreading

Crowdsourced security and bug bounty adoption is spreading


Monday, May 20, 2019 by

There continues to be a fundamental imbalance in cybersecurity. Attackers are finding new ways to penetrate cyber defenses as targets proliferate to the cloud, mobile, and connected devices. Defenders need to take a proactive security approach. The evolving threat landscape and the ever-widening security skills gap are giving rise to new approaches such as crowdsourc...


Women-are-using-financial-apps-more-than-men-says-Liftoff-report

Women are using financial apps more than men says Liftoff report


Friday, April 12, 2019 by

Liftoff released a new report in partnership with Leanplum uncovering new insights into the world of mobile finance. Specifically, it found that women are more engaged than ever with finance apps, meaning it’s prime time for marketers to double-down on investments in the traditionally underserved demographic. The report also shows the Asia-Pacific region (APAC) co...


Windows-10-security-hygiene-is-a-priority-for-many-says-new-report

Windows 10 security hygiene is a priority for many says new report


Wednesday, September 26, 2018 by

Adaptiva announced the results of its 2018 Enterprise Endpoint Security Survey. The survey showed that security is galvanizing around the move to Windows 10, the operating system that the majority of companies surveyed now run in their organizations. In the survey, over half of respondents indicated that security hygiene is a priority, listing security configuration man...


IoT-security-standards-to-come-with-Sprint-Curiosity-IoT

IoT security standards to come with Sprint Curiosity IoT


Tuesday, September 18, 2018 by

Sprint has unveiled the Curiosity IoT platform, a new standard in how IoT is managed and secured. Enterprises will now be able to manage IoT devices and connectivity over the air across multiple SIM profiles. Intelligence from device data will be generated instantly through the dedicated, distributed and virtualized core, built together with the new operating system. An...


National-Coding-Week-is-here

National Coding Week is here


Monday, September 17, 2018 by

National Coding Week is upon us. That's why we thought it would be great to compile some quotes from industry experts to talk about what they think is most important about learning how to coding - a question seen through many different lenses. “Today, software drives business. So, if an organization wants to excel, it needs to become a software-powered jugg...


Merged-mining-partnership-between-Bitmain-and-Elastos

Merged mining partnership between Bitmain and Elastos


Tuesday, August 28, 2018 by

Elastos (ELA) announced a merged mining partnership with Bitmain Technologies. The merged mining partnership means that for miners and future users of the smart web platform, it guarantees the security of the Bitcoin network by sharing its hashpower. Merged mining allows Bitcoin (BTC) and the ELA coin to be mined simultaneously and more efficiently, and conserves energy...


Data-masking-report-finds-GDPR-is-pressing-the-need-for-solutions

Data masking report finds GDPR is pressing the need for solutions


Thursday, August 23, 2018 by

Dataguise has been recognized in a new report on data masking by Gartner titled, Market Guide for Data Masking. As data growth continues and data analytics becomes a mission-critical operation throughout the enterprise, Dataguise has been supporting the need to protect sensitive information in the wake of new data privacy regulations such as the General Data Protec...


Stony-Brook-University-gets-$25M-for-new-engineering-program

Stony Brook University gets $25M for new engineering program


Wednesday, August 22, 2018 by

Senate Majority Leader John Flanagan (2nd Senate District) and Chairman of the Senate’s Higher Education Committee Kenneth LaValle (1st Senate District) announced the award of $25 million in funding to Stony Brook University that will enable the university to begin the initial phases for developing a new engineering building on campus. The funding will enable Ston...


NodeSource-pricing-tier-has-changed

NodeSource pricing tier has changed


Thursday, August 16, 2018 by

NodeSource announced the release of a new, integrated product platform. Teams can now benefit from a more cohesive set of solutions for Engineering and DevOps, as well as a more streamlined user experience. This release also marks the first time NodeSource has offered a free-forever pricing tier, targeted at individual developers or those working on small projects. An a...


Information-security-event-Black-Hat-USA-celebrates-21-years

Information security event Black Hat USA celebrates 21 years


Tuesday, August 14, 2018 by

Black Hat has highlighted their 2018 event programming and new initiatives that will help make Black Hat USA 2018 its most successful show to date. The event welcomed nearly 19,000 of the most security-savvy professionals across the InfoSec spectrum - spanning academia, world-class researchers, and leaders in the public and private sectors. The event’s robust line...


Questioning-the-future-of-privacy-and-the-safety-of-personal-identity

Questioning the future of privacy and the safety of personal identity


Thursday, June 28, 2018 by

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR. These findings and more are outlin...


CEO-Roundtable-participants-announced-for-Telecom-Exchange-NYC-2018

CEO Roundtable participants announced for Telecom Exchange NYC 2018


Wednesday, May 9, 2018 by

Jaymie Scotto & Associates (JSA), founder and host of the C-Level networking event series, the Telecom Exchange (TEX), announced its CEO Roundtable participants and topics for its 2018 TEX NYC event, taking place June 19-20 in Hoboken, NJ. The event will feature four CEO Roundtables, providing a major platform for tech, telecom and content thought leaders to deliber...


Stop-the-menace-of-Android-rooting-malware-attacks-with-RASP

Stop the menace of Android rooting malware attacks with RASP


Monday, September 25, 2017 by

One of the key security issues facing organizations that support Android devices is the risk of rooting malware. A number of malware families on the Android mobile OS attempt to obtain root access once installed because the elevated privileges gained come in handy to perform malicious activities.   What you need to know about Tordow v2.0 and Pegasus The To...


The-future-of-cybersecurity-in-machine-learning

The future of cybersecurity in machine learning


Sunday, July 30, 2017 by

McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...


Humans-are-still-the-biggest-threat-to-cyber-security-report-shows

Humans are still the biggest threat to cyber security report shows


Saturday, December 17, 2016 by

Global technology company Nuix have released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behavior was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective ...


DevOps-Enterprise-Summit-Returns-to-San-Francisco-in-November

DevOps Enterprise Summit Returns to San Francisco in November


Thursday, August 18, 2016 by

The DevOps Enterprise Summit 2016 will provide a DevOps conference focusing on the challenges large, complex organizations face in implementing DevOps principles and practices. The event will be held November 7 - 9, 2016 at the Hilton San Francisco Union Square and will feature presentations from Fortune 1000 brands that leverage DevOps with event programming that ...


Don

Don't Expect Apple and Google to Do App Security for You


Tuesday, May 24, 2016 by

The appetite for mobile apps with an appealing user experience shows no signs of slowing – even in closely regulated industries such as financial services and healthcare. In fact, according to Gartner, by the end of 2017, IT organizations will be hard-pressed to meet market demand for mobile app development services as it grows at least five times faster than IT’s abili...


Five-Common-Mobile-App-Security-Vulnerabilities--And-How-to-Fix-Them

Five Common Mobile App Security Vulnerabilities And How to Fix Them


Saturday, April 30, 2016 by

Mobile app security leaves much to be desired. That was the conclusion of a 2016 Hewlett Packard Enterprise (HPE) study which found that a staggering 96 percent of 36,000 mobile apps failed at least one of 10 privacy checks. Three years ago, a similar HPE study found that 97 percent of 2,000 apps reviewed held insecure private information. As mobile app usage conti...


Breaking-Down-the-Essential-Elements-for-DevOps-Success

Breaking Down the Essential Elements for DevOps Success


Thursday, January 21, 2016 by

We recently visited with Michael Madden, CA Technologies General Manager - DevOps, to tap into his expertise and insight into how companies can realize the full potential of adopting a DevOps Mentality. ADM: What is the difference between DevOpsSec, Secure DevOps and Rugged DevOps?Madden: There are many definitions around each of these movements, but fundamentally ...


New-Report-Highlights-Wide-Ranging-Cybersecurity-Challenges

New Report Highlights Wide Ranging Cybersecurity Challenges


Wednesday, September 2, 2015 by

Cybersecurity Ventures has released its Cybersecurity Market Report for Q3 2015 which provides an overview of software development and application security trends, statistics, best practices, and resources. Highlights of the report include:- “The SANS Institute 2015 State of Application Security Report” states that many information security engineers don’t understa...


GE

GE's Predix Cloud to Usher in a New Era for Industrial Data and Analytics


Monday, August 10, 2015 by

GE is entering the cloud services market with Predix Cloud, a cloud solution designed specifically for industrial data and analytics. Predix Cloud is offered as a platform-as-a-service (PaaS) to help companies capture and analyze large volumes, velocities and varieties of machine data within a highly secure, industrial-strength cloud environment. Predix Cloud will ...


Enterprise-Mobile-QA-with-Ranjeet-Vidwans-VP-of-Marketing-for-Mocana

Enterprise Mobile QA with Ranjeet Vidwans VP of Marketing for Mocana


Tuesday, February 24, 2015 by

We recently sat down with  Ranjeet Vidwans, VP of Marketing for Mocana, to discuss challenges facing companies with the implementation of an enterprise mobile strategy.ADM: What do you see as the major differences between an enterprise mobile app and a consumer mobile app? Vidwans: Interestingly, there are probably more important fundamental similarities ...


Technology-Execs-Say-Mobile-and-Cloud-Revenues-Are-Surging-with-Data-and-Analytics-Expected-to-Provide-the-Greatest-Revenue-Growth-Opportunities-

Technology Execs Say Mobile and Cloud Revenues Are Surging with Data and Analytics Expected to Provide the Greatest Revenue Growth Opportunities


Wednesday, June 18, 2014 by

Mobile and Cloud revenues are surging, according to the results of the annual Technology Business Outlook survey of U.S.-based technology executives conducted by KPMG. The report shows in part these executives believe data and analytics (D&A) are expected to be the top revenue growth driver over the next two years. At the same time, security is projected to become a...


ESG-Defines-the-Market-for-Big-Data-Security-Analytics

ESG Defines the Market for Big Data Security Analytics


Friday, May 31, 2013 by

Leading analyst firm publishes report on information security analytics toolsMilford, Mass - May 21, 2013 - A new report examining the supply side of big data security analytics has been published by Enterprise Strategy Group (ESG), a leading IT research, analysis, and strategy firm. The report defines the market for big data security analytics and gauges existing solut...