investigation

investigation news search results

Developer news items we found relating to investigation

35 results
GenAI-cybersecurity-assistant-lands-from-IBM

GenAI cybersecurity assistant lands from IBM


Friday, August 16, 2024 by

IBM recently announced the introduction of generative AI capabilities to its managed Threat Detection and Response Services utilized by IBM Consulting analysts to advance and streamline security operations for clients. Built on IBM's watsonx data and AI platform, the new IBM Consulting Cybersecurity Assistant is designed to accelerate and improve the identification,...


EU-says-Apple-breached-DMA-regulations

EU says Apple breached DMA regulations


Wednesday, July 10, 2024 by

The AP is among outlets reporting that Apple becomes first target of EU’s new digital competition rules aimed at big tech, reporting: “European Union regulators leveled their first charges under the bloc’s new digital competition rulebook, accusing Apple of preventing app makers from pointing users to cheaper options outside its App Store. The European...


Travel-apps-are-secretly-harvesting-your-data

Travel apps are secretly harvesting your data


Monday, July 8, 2024 by

From Booking.com to Airbnb, Hilton to Radisson, every travel app you will use for your next vacation will try to milk your data. Cybernews researchers' investigation revealed that some won’t even tell you about the secrets they are extracting from you. According to the data presented by the researchers, Booking.com, MakeMyTrip, and HotelTonight are the ultimat...


Veracode-acquires-Longbow-Security

Veracode acquires Longbow Security


Thursday, April 18, 2024 by

Veracode announced the acquisition of Longbow Security, a security risk management platform for cloud-native environments. The acquisition marks the next exciting phase of Veracode, underscoring the company’s commitment to help organizations effectively manage and reduce application risk across the growing attack surface. The integration of Longbow in...


Cybersecurity-performance-optimization-updates-from-Logpoint

Cybersecurity performance optimization updates from Logpoint


Friday, February 2, 2024 by

Logpoint is releasing new capabilities to its Converged SIEM platform, enhancing threat detection and security operations and streamlining case management. Organizations can focus on essential security matters with the new capabilities by reducing workload, simplifying automation, and freeing up resources. The new release delivers increased system stability and ...


AI-performance-monitoring-from-Datadog-and-Vertex-AI

AI performance monitoring from Datadog and Vertex AI


Thursday, November 16, 2023 by

Datadog, Inc., the monitoring and security platform for cloud applications, announced an expanded strategic partnership with Google Cloud, which enables Google Cloud customers to proactively observe and secure their cloud-native and hybrid applications within Datadog’s unified platform. As part of the expanded partnership and integrations, Datadog is one of the fi...


Runtime-code-review-from-AppMap-enhances-productivity

Runtime code review from AppMap enhances productivity


Tuesday, November 14, 2023 by

AppMap has announced its innovative Runtime Code Review solution that will transform software quality and the developer experience. AppMap's mission is to deliver actionable insights to developers where they work, and AppMap continues to deliver on the promise with its latest release for the GitHub Marketplace. Unexpected runtime defects account fo...


Is-Temu-safe,-legit,-or-dangerous:-Perspective-from-an-app-developer

Is Temu safe, legit, or dangerous: Perspective from an app developer


Wednesday, July 12, 2023 by

Temu is a shopping website, and app chalked full of products from overseas at ridiculously dirt cheap prices. They have almost everything you can imagine too. From laser pointer slingshots to Expresso makers, the entire ecosystem is built around keeping you shopping with a gamified experience, and it gets addicting quickly. Some of the ADM staff have placed orders an...


Identity-will-hold-the-keys-to-the-kingdom-for-cybercriminals

Identity will hold the keys to the kingdom for cybercriminals


Wednesday, February 8, 2023 by

In 2023, identity will continue to hold the keys to the kingdom for cybercriminals. This is a continuation from 2022, with the Verizon Data Breach Investigations Report (DBIR) attributing 80% of basic web application attacks to the use of stolen credentials like passwords. Security incidents usually involve a variety of techniques, from social engineering to supply chai...


Cryptocurrency-donations-for-churches

Cryptocurrency donations for churches


Thursday, January 27, 2022 by

Each year, River Valley Church hosts an annual event called Kingdom Builders, where they ask church attendees to give generously to different projects including global missions, future leadership development, and local church investment. With eight campuses spread across the Twin Cities of Minnesota, River Valley Church recently partnered with Engiven, a leading cryptoc...


Protecting-source-code

Protecting source code


Wednesday, October 6, 2021 by

Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...


Network-visibility-improves-with-Endace-and-Kemp-Technologies

Network visibility improves with Endace and Kemp Technologies


Tuesday, August 24, 2021 by

Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy. Network visibility improves, helping teams reduce incident response times The enhanced network flow metadata generation and intelligent traffic mon...


Microsoft-DART-team-tracks-77k-active-web-shells

Microsoft DART team tracks 77k active web shells


Thursday, February 6, 2020 by

In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers. According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...


Universal-source-code-search-engine-emerges

Universal source code search engine emerges


Friday, November 22, 2019 by

Sourcegraph announced a new collaboration with GitLab, along with the world’s first universal source code search engine. The company has experienced exponential growth fueled by its expanding community of over 10,000 paid developers and tens of thousands of free open source developers who actively use its platform. “GitLab and Sourcegraph are both oriente...


Instana-announces-new-capabilities

Instana announces new capabilities


Wednesday, November 6, 2019 by

Instana announced new capabilities that make it the only application management solution that can jump right into a log analysis tool with all context of the application and component under investigation. “IT teams responsible for deploying and maintaining today’s mission critical applications must react quickly, especially when attacking service issues,&...


The-DMV-is-selling-driver-data-and-Eve-Maler-weighs-in

The DMV is selling driver data and Eve Maler weighs in


Tuesday, September 24, 2019 by

Motherboard broke the news on September 6 that Departments of Motor Vehicles (DMVs) around the nation have been making millions by selling drivers’ personally identifiable information to thousands of businesses. Amongst the DMVs customers are insurance agencies, tow companies, data brokers and even private investigators – all who are able to purchase records...


Artificial-Intelligence-capabilities-in-Siren-10.3-release

Artificial Intelligence capabilities in Siren 10.3 release


Wednesday, August 21, 2019 by

Siren, an investigative intelligence platform released Siren 10.3. The latest version of Siren launches five new artificial intelligence (AI) capabilities: entity resolution, deep learning-based predictive analytics and alerting, deep learning-based times series anomaly detection, real-time topic clustering for textual corpuses and associative model technology...


UK-parliamentary-report-says-Facebook-should-be-regulated

UK parliamentary report says Facebook should be regulated


Monday, February 18, 2019 by

Facebook and its executives have been labeled "digital gangsters" in a UK parliamentary report that calls for the company to be regulated, after an 18-month long investigation. The 180-page document says that Facebook willfully broke data privacy and competition laws. A summary of the UK parliamentary report finds Compulsory Code of Ethics for te...


IAST-supports-AppSec-efficiencies-while-cutting-costs-and-headaches

IAST supports AppSec efficiencies while cutting costs and headaches


Monday, November 26, 2018 by

It’s easy to feel passionate about interactive application security testing (IAST) in the world of application security. You see, IAST makes security testing almost invisible. It’s not something that requires a highly trained team to be brought in to carry out and analyze testing results. It doesn’t hold up other teams or processes from moving forward....


Changes-to-the-way-notifications-work-in-iOS-12-you-need-to-know

Changes to the way notifications work in iOS 12 you need to know


Wednesday, September 19, 2018 by

iOS 12’s public release has brought about key changes to the way we do notifications. With these changes, Urban Airship urges app publishers to adopt customer-centric messaging best practices to accommodate new user behavior, improve notification visibility and maximize the value that their app can deliver. Granular user controls over notifications, new Grouped No...


DevSecOps-showcase-by-Sumo-Logic-unravels-all-their-new-changes

DevSecOps showcase by Sumo Logic unravels all their new changes


Monday, September 17, 2018 by

Sumo Logic announced a number of new solutions and enhancements to its platform to empower enterprises to "win in the analytics economy." These innovations, as well as those from DevSecOps ecosystem partners, will be showcased this week at Sumo Logic’s user conference, Illuminate, in Burlingame, Calif. Illuminate will gather over 600 experts in machine d...


Questioning-the-future-of-privacy-and-the-safety-of-personal-identity

Questioning the future of privacy and the safety of personal identity


Thursday, June 28, 2018 by

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR. These findings and more are outlin...


New-partnership-emerges-to-simply-IoT-security

New partnership emerges to simply IoT security


Wednesday, May 16, 2018 by

In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...


Perspective-on-the-Microsoft-v.-US-Supreme-Court-decision-

Perspective on the Microsoft v. US Supreme Court decision


Saturday, April 21, 2018 by

The U.S. Supreme Court has recently decided on a ruling for the Microsoft v. U.S. Supreme Court case. Because of the very important implications that this decision could have on the technology industry, we thought it best to get a legal opinion on what the ruling could mean in the future.Geoffrey Sant is a Partner at the international law firm Dorsey & Whitney LLP a...


Sensory-brings-low-power-wake-words-to-mobile-apps

Sensory brings low power wake words to mobile apps


Monday, April 9, 2018 by

Sensory has announced that it has made a significant breakthrough in running its TrulyHandsfree wake word and speech recognition AI engine directly on Android and iOS smartphone applications at low-power. As a software component, TrulyHandsfree can be adapted to any app without requiring special purpose hardware or DSPs to capture efficiencies in computing.Until now, al...


Cisco-releases-security-connector-app-for-iOS-devices

Cisco releases security connector app for iOS devices


Tuesday, January 2, 2018 by

Cisco announced the availability of Cisco Security Connector, a security app designed to give enterprises the deepest visibility and control over network activity on iOS devices, now in the App Store.Apple has designed iOS to be secure from the ground up and to be simple, intuitive, and powerful for users. By using iPhones and iPads with iOS 11 and Cisco Security Connec...


Device-testing-in-the-cloud-empowers-developers--and-ad-fraudsters-

Device testing in the cloud empowers developers and ad fraudsters


Friday, December 8, 2017 by

Cloud technology has been a game-changer for many industries. It has reduced IT costs, made updating and upgrading systems much easier, allowed businesses to scale operations quickly, and it has enabled flexible work collaboration. The cloud also has major implications on how digital ads are tested and served to millions of people globally. The opportunity to seamlessly...


How-to-avoid-flaky-automated-testing-results

How to avoid flaky automated testing results


Tuesday, November 28, 2017 by

Flaky tests are the bane of any tester’s existence, forcing them to spend precious time on non-functional issues. This slows down the product lifecycle and lowers an organization’s confidence in functional testing, which also decreases the likelihood of development teams writing end-to-end tests.End-to-end tests measure readiness for deployment by ensuring that the appl...


Splunk-expands-machine-learning-capabilities

Splunk expands machine learning capabilities


Monday, October 2, 2017 by

Splunk Inc. has announced expanded machine learning capabilities across its product portfolio with the release of their Enterprise 7.0, IT Service Intelligence (ITSI) 3.0, User Behavior Analytics (UBA) 4.0 and updates to their Cloud platform. Splunk also introduced an updated suite of solutions that apply analytics and machine learning to fraud and cloud monitoring use ...


Developers-are-most-wary-of-these-technologies-being-hacked

Developers are most wary of these technologies being hacked


Wednesday, August 2, 2017 by

In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology.Propeller Insights conducted the recent survey of U.S.-based software developers for Netsparker from July 5-7, 2017.Government mo...


The-future-of-cybersecurity-in-machine-learning

The future of cybersecurity in machine learning


Sunday, July 30, 2017 by

McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...


Capsule8-comes-out-of-stealth-to-help-protect-Linux-from-attacks

Capsule8 comes out of stealth to help protect Linux from attacks


Wednesday, February 15, 2017 by

Capsule8 has emerged from stealth mode to unveil its plans for the industry’s first container-aware, real-time threat protection platform designed to protect legacy and next-generation Linux infrastructures from both known and unknown attacks. Founded by experienced hackers John Viega, Dino Dai Zovi and Brandon Edwards, Capsule8 is being built on the real-world experien...


IBM-Watson-for-cyber-security-has-cognitive-skills

IBM Watson for cyber security has cognitive skills


Monday, February 13, 2017 by

According to IBM research, security teams sift through more than 200,000 security events per day on average, leading to over 20,000 hours per year wasted chasing false positives. The need to introduce cognitive technologies into security operations centers will be critical to keep up with the anticipated doubling of security incidents over the next five years and increa...


Security-Intelligence-Platform-from-Exabeam-launched

Security Intelligence Platform from Exabeam launched


Thursday, February 2, 2017 by

Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...


How-Agile-scrum-development-methodologies-work-in-the-Federal-space

How Agile scrum development methodologies work in the Federal space


Thursday, January 26, 2017 by

Agile scrum development methodology has become a hot topic in recent news. More and more companies seem to be adopting this approach because they find that it saves the client time and money. Mobomo, a D.C. based tech company, works with many clients in the Federal space. They were able to give App Developer Magazine more insight into Agile Scrum Methodology and the imp...