investigation

investigation news search results

Developer news items we found relating to investigation

35 results
Veracode-acquires-Longbow-Security

Veracode acquires Longbow Security


Thursday, April 18, 2024 by

Veracode announced the acquisition of Longbow Security, a security risk management platform for cloud-native environments. The acquisition marks the next exciting phase of Veracode, underscoring the company’s commitment to help organizations effectively manage and reduce application risk across the growing attack surface. The integration of Longbow in...


Cybersecurity-performance-optimization-updates-from-Logpoint

Cybersecurity performance optimization updates from Logpoint


Friday, February 2, 2024 by

Logpoint is releasing new capabilities to its Converged SIEM platform, enhancing threat detection and security operations and streamlining case management. Organizations can focus on essential security matters with the new capabilities by reducing workload, simplifying automation, and freeing up resources. The new release delivers increased system stability and ...


Runtime-code-review-from-AppMap-enhances-productivity

Runtime code review from AppMap enhances productivity


Tuesday, November 14, 2023 by

AppMap has announced its innovative Runtime Code Review solution that will transform software quality and the developer experience. AppMap's mission is to deliver actionable insights to developers where they work, and AppMap continues to deliver on the promise with its latest release for the GitHub Marketplace. Unexpected runtime defects account fo...


Is-Temu-safe,-legit,-or-dangerous:-Perspective-from-an-app-developer

Is Temu safe, legit, or dangerous: Perspective from an app developer


Wednesday, July 12, 2023 by

Temu is a shopping website, and app chalked full of products from overseas at ridiculously dirt cheap prices. They have almost everything you can imagine too. From laser pointer slingshots to Expresso makers, the entire ecosystem is built around keeping you shopping with a gamified experience, and it gets addicting quickly. Some of the ADM staff have placed orders an...


Cryptocurrency-donations-for-churches

Cryptocurrency donations for churches


Thursday, January 27, 2022 by

Each year, River Valley Church hosts an annual event called Kingdom Builders, where they ask church attendees to give generously to different projects including global missions, future leadership development, and local church investment. With eight campuses spread across the Twin Cities of Minnesota, River Valley Church recently partnered with Engiven, a leading cryptoc...


Protecting-source-code

Protecting source code


Wednesday, October 6, 2021 by

Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...


Network-visibility-improves-with-Endace-and-Kemp-Technologies

Network visibility improves with Endace and Kemp Technologies


Tuesday, August 24, 2021 by

Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy. Network visibility improves, helping teams reduce incident response times The enhanced network flow metadata generation and intelligent traffic mon...


Microsoft-DART-team-tracks-77k-active-web-shells

Microsoft DART team tracks 77k active web shells


Thursday, February 6, 2020 by

In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers. According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...


Instana-announces-new-capabilities

Instana announces new capabilities


Wednesday, November 6, 2019 by

Instana announced new capabilities that make it the only application management solution that can jump right into a log analysis tool with all context of the application and component under investigation. “IT teams responsible for deploying and maintaining today’s mission critical applications must react quickly, especially when attacking service issues,&...


The-DMV-is-selling-driver-data-and-Eve-Maler-weighs-in

The DMV is selling driver data and Eve Maler weighs in


Tuesday, September 24, 2019 by

Motherboard broke the news on September 6 that Departments of Motor Vehicles (DMVs) around the nation have been making millions by selling drivers’ personally identifiable information to thousands of businesses. Amongst the DMVs customers are insurance agencies, tow companies, data brokers and even private investigators – all who are able to purchase records...


Artificial-Intelligence-capabilities-in-Siren-10.3-release

Artificial Intelligence capabilities in Siren 10.3 release


Wednesday, August 21, 2019 by

Siren, an investigative intelligence platform released Siren 10.3. The latest version of Siren launches five new artificial intelligence (AI) capabilities: entity resolution, deep learning-based predictive analytics and alerting, deep learning-based times series anomaly detection, real-time topic clustering for textual corpuses and associative model technology...


UK-parliamentary-report-says-Facebook-should-be-regulated

UK parliamentary report says Facebook should be regulated


Monday, February 18, 2019 by

Facebook and its executives have been labeled "digital gangsters" in a UK parliamentary report that calls for the company to be regulated, after an 18-month long investigation. The 180-page document says that Facebook willfully broke data privacy and competition laws. A summary of the UK parliamentary report finds Compulsory Code of Ethics for te...


Changes-to-the-way-notifications-work-in-iOS-12-you-need-to-know

Changes to the way notifications work in iOS 12 you need to know


Wednesday, September 19, 2018 by

iOS 12’s public release has brought about key changes to the way we do notifications. With these changes, Urban Airship urges app publishers to adopt customer-centric messaging best practices to accommodate new user behavior, improve notification visibility and maximize the value that their app can deliver. Granular user controls over notifications, new Grouped No...


DevSecOps-showcase-by-Sumo-Logic-unravels-all-their-new-changes

DevSecOps showcase by Sumo Logic unravels all their new changes


Monday, September 17, 2018 by

Sumo Logic announced a number of new solutions and enhancements to its platform to empower enterprises to "win in the analytics economy." These innovations, as well as those from DevSecOps ecosystem partners, will be showcased this week at Sumo Logic’s user conference, Illuminate, in Burlingame, Calif. Illuminate will gather over 600 experts in machine d...


Questioning-the-future-of-privacy-and-the-safety-of-personal-identity

Questioning the future of privacy and the safety of personal identity


Thursday, June 28, 2018 by

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR. These findings and more are outlin...


Perspective-on-the-Microsoft-v.-US-Supreme-Court-decision-

Perspective on the Microsoft v. US Supreme Court decision


Saturday, April 21, 2018 by

The U.S. Supreme Court has recently decided on a ruling for the Microsoft v. U.S. Supreme Court case. Because of the very important implications that this decision could have on the technology industry, we thought it best to get a legal opinion on what the ruling could mean in the future.Geoffrey Sant is a Partner at the international law firm Dorsey & Whitney LLP a...


Device-testing-in-the-cloud-empowers-developers--and-ad-fraudsters-

Device testing in the cloud empowers developers and ad fraudsters


Friday, December 8, 2017 by

Cloud technology has been a game-changer for many industries. It has reduced IT costs, made updating and upgrading systems much easier, allowed businesses to scale operations quickly, and it has enabled flexible work collaboration. The cloud also has major implications on how digital ads are tested and served to millions of people globally. The opportunity to seamlessly...


How-to-avoid-flaky-automated-testing-results

How to avoid flaky automated testing results


Tuesday, November 28, 2017 by

Flaky tests are the bane of any tester’s existence, forcing them to spend precious time on non-functional issues. This slows down the product lifecycle and lowers an organization’s confidence in functional testing, which also decreases the likelihood of development teams writing end-to-end tests.End-to-end tests measure readiness for deployment by ensuring that the appl...


Splunk-expands-machine-learning-capabilities

Splunk expands machine learning capabilities


Monday, October 2, 2017 by

Splunk Inc. has announced expanded machine learning capabilities across its product portfolio with the release of their Enterprise 7.0, IT Service Intelligence (ITSI) 3.0, User Behavior Analytics (UBA) 4.0 and updates to their Cloud platform. Splunk also introduced an updated suite of solutions that apply analytics and machine learning to fraud and cloud monitoring use ...


Developers-are-most-wary-of-these-technologies-being-hacked

Developers are most wary of these technologies being hacked


Wednesday, August 2, 2017 by

In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology.Propeller Insights conducted the recent survey of U.S.-based software developers for Netsparker from July 5-7, 2017.Government mo...


The-future-of-cybersecurity-in-machine-learning

The future of cybersecurity in machine learning


Sunday, July 30, 2017 by

McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...


Capsule8-comes-out-of-stealth-to-help-protect-Linux-from-attacks

Capsule8 comes out of stealth to help protect Linux from attacks


Wednesday, February 15, 2017 by

Capsule8 has emerged from stealth mode to unveil its plans for the industry’s first container-aware, real-time threat protection platform designed to protect legacy and next-generation Linux infrastructures from both known and unknown attacks. Founded by experienced hackers John Viega, Dino Dai Zovi and Brandon Edwards, Capsule8 is being built on the real-world experien...


IBM-Watson-for-cyber-security-has-cognitive-skills

IBM Watson for cyber security has cognitive skills


Monday, February 13, 2017 by

According to IBM research, security teams sift through more than 200,000 security events per day on average, leading to over 20,000 hours per year wasted chasing false positives. The need to introduce cognitive technologies into security operations centers will be critical to keep up with the anticipated doubling of security incidents over the next five years and increa...


Security-Intelligence-Platform-from-Exabeam-launched

Security Intelligence Platform from Exabeam launched


Thursday, February 2, 2017 by

Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...


How-Agile-scrum-development-methodologies-work-in-the-Federal-space

How Agile scrum development methodologies work in the Federal space


Thursday, January 26, 2017 by

Agile scrum development methodology has become a hot topic in recent news. More and more companies seem to be adopting this approach because they find that it saves the client time and money. Mobomo, a D.C. based tech company, works with many clients in the Federal space. They were able to give App Developer Magazine more insight into Agile Scrum Methodology and the imp...


Cyberbit

Cyberbit's SOC 3D automation updates and what you should know


Tuesday, December 20, 2016 by

Cyberbit just announced a new version of its SOC 3D automation and orchestration platform that increases productivity and effectiveness of the SOC and substantially reduces incident response times. The new platform integrates with all major SIEM and security solutions, automates SOC runbooks and workflows, and prioritizes incidents according to their business impact. It...


Intel-Security-Enhances-Unified-Defense-Architecture

Intel Security Enhances Unified Defense Architecture


Thursday, November 3, 2016 by

Intel Security has announced an enhanced unified defense architecture designed to empower organizations to more effectively protect a new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where ...


Datadog-announces-new-machine-learning-based-feature-called-Anomaly-Detection

Datadog announces new machine learning based feature called Anomaly Detection


Thursday, October 27, 2016 by

Datadog, a monitoring service for modern cloud environments, has announced the release of a new machine-learning based feature called Anomaly Detection. This will allow engineering teams to quickly identify abnormal behavior within rapidly changing cloud environments, based on historical patterns that are impossible to track manually.Anomaly Detection works by constantl...


Splunk-Harnesses-Machine-Learning-for-New-Innovations

Splunk Harnesses Machine Learning for New Innovations


Tuesday, September 27, 2016 by

Splunk Inc. has released new versions of Splunk Enterprise, Splunk IT Service Intelligence (ITSI), Splunk Enterprise Security (ES) and Splunk User Behavior Analytics (UBA). Available on-premises or in the cloud, the newest versions of Splunk solutions leverage machine learning to make it faster and easier to maximize the value machine data can deliver to organizations.A...


Partnership-Between-Developers,-Publishers-and-Platforms-Is-Key-Says-New-Report

Partnership Between Developers, Publishers and Platforms Is Key Says New Report


Monday, September 12, 2016 by

The Application Developers Alliance has released the result of a global survey of mobile app developers and publishers: Competition in the Mobile App Ecosystem. The report shows a healthy mobile app market and an industry that is concerned about being misrepresented and sees unnecessary intervention from external authorities.In the context of the European Commission’s o...


New-Relic-Now-Offers-Browser-Monitoring-for-SPAs

New Relic Now Offers Browser Monitoring for SPAs


Tuesday, July 12, 2016 by

New Relic has announced updates to its New Relic Browser providing new support for web applications built with single-page application (SPA) frameworks and libraries. When combined with New Relic APM, the browser monitoring for SPAs will allow users to have end-to-end visibility of their application’s performance, from the front-end to the services it is running on.New ...


Microsoft-Cloud-App-Security-is-Now-Generally-Available

Microsoft Cloud App Security is Now Generally Available


Wednesday, April 13, 2016 by

The Microsoft Cloud App Security platform is now generally available offering a cloud-delivered service built for cloud apps.The platform offers two main components: (1) Discovery of cloud usage in a company using log-based traffic analysis and (2) Granular control for sanctioned apps leveraging API-based integration. With platform’s tools to help uncover Shadow IT, ass...


Distil-Networks-Releases-API-Security-Service

Distil Networks Releases API Security Service


Thursday, April 7, 2016 by

Distil Networks has released a new Distil API Security service that protects vulnerable Application Programming Interface (API) endpoints from malicious traffic. The Distil API Security solution protects all types of APIs including those serving web browsers, mobile applications, and Internet of Things (IoT) connected devices. Distil API Security defends against de...


How-March-Madness-Impacts-Enterprise-Mobile-Data-Usage-and-BYOD-Security

How March Madness Impacts Enterprise Mobile Data Usage and BYOD Security


Tuesday, April 5, 2016 by

Oversized events like March Madness and the Olympics not only can cause decreased productivity from employees, but also may increase security risks for companies whose employees are using devices that access corporate data. We visited with Michael Covington, VP Product for Wandera, to discuss research the company conducted during the NCAA basketball tournament to learn ...


Out-of-Band-Update-for-Flash

Out of Band Update for Flash


Wednesday, March 23, 2016 by

MS16-036 is a critical out of band update and resolves 20 vulnerabilities in Adobe Flash Player on all supported versions of Windows Server 2012, Windows Server 2012 R2, Windows 8.1, Windows RT 8.1, and Windows 10. This bulletin addresses vulnerabilities by updating the Adobe Flash libraries contained within all supported versions of Internet Explorer and Microsoft...