OceanGate Titan sub tracking relied on hand-typed Excel spreadsheet
Friday, September 27, 2024 by Russ Scritchfield
In a series of hearings and testimonies surrounding the tragic implosion of the OceanGate Titan submersible, key insights have emerged that shed light on the events leading up to the incident. OceanGate’s founder, Stockton Rush, is currently facing scrutiny as multiple stakeholders examine the safety protocols and operational decisions made by the company. During ...
GenAI cybersecurity assistant lands from IBM
Friday, August 16, 2024 by Freeman Lightner
IBM recently announced the introduction of generative AI capabilities to its managed Threat Detection and Response Services utilized by IBM Consulting analysts to advance and streamline security operations for clients. Built on IBM's watsonx data and AI platform, the new IBM Consulting Cybersecurity Assistant is designed to accelerate and improve the identification,...
EU says Apple breached DMA regulations
Wednesday, July 10, 2024 by Richard Harris
The AP is among outlets reporting that Apple becomes first target of EU’s new digital competition rules aimed at big tech, reporting: “European Union regulators leveled their first charges under the bloc’s new digital competition rulebook, accusing Apple of preventing app makers from pointing users to cheaper options outside its App Store. The European...
Veracode acquires Longbow Security
Thursday, April 18, 2024 by Freeman Lightner
Veracode announced the acquisition of Longbow Security, a security risk management platform for cloud-native environments. The acquisition marks the next exciting phase of Veracode, underscoring the company’s commitment to help organizations effectively manage and reduce application risk across the growing attack surface.
The integration of Longbow in...
Cybersecurity performance optimization updates from Logpoint
Friday, February 2, 2024 by Freeman Lightner
Logpoint is releasing new capabilities to its Converged SIEM platform, enhancing threat detection and security operations and streamlining case management. Organizations can focus on essential security matters with the new capabilities by reducing workload, simplifying automation, and freeing up resources.
The new release delivers increased system stability and ...
AI performance monitoring from Datadog and Vertex AI
Thursday, November 16, 2023 by Richard Harris
Datadog, Inc., the monitoring and security platform for cloud applications, announced an expanded strategic partnership with Google Cloud, which enables Google Cloud customers to proactively observe and secure their cloud-native and hybrid applications within Datadog’s unified platform. As part of the expanded partnership and integrations, Datadog is one of the fi...
Runtime code review from AppMap enhances productivity
Tuesday, November 14, 2023 by Richard Harris
AppMap has announced its innovative Runtime Code Review solution that will transform software quality and the developer experience. AppMap's mission is to deliver actionable insights to developers where they work, and AppMap continues to deliver on the promise with its latest release for the GitHub Marketplace.
Unexpected runtime defects account fo...
Is Temu safe, legit, or dangerous: Perspective from an app developer
Wednesday, July 12, 2023 by Richard Harris
Temu is a shopping website, and app chalked full of products from overseas at ridiculously dirt cheap prices. They have almost everything you can imagine too. From laser pointer slingshots to Expresso makers, the entire ecosystem is built around keeping you shopping with a gamified experience, and it gets addicting quickly.
Some of the ADM staff have placed orders an...
Identity will hold the keys to the kingdom for cybercriminals
Wednesday, February 8, 2023 by Brittany Hainzinger
In 2023, identity will continue to hold the keys to the kingdom for cybercriminals. This is a continuation from 2022, with the Verizon Data Breach Investigations Report (DBIR) attributing 80% of basic web application attacks to the use of stolen credentials like passwords. Security incidents usually involve a variety of techniques, from social engineering to supply chai...
Cryptocurrency donations for churches
Thursday, January 27, 2022 by Richard Harris
Each year, River Valley Church hosts an annual event called Kingdom Builders, where they ask church attendees to give generously to different projects including global missions, future leadership development, and local church investment. With eight campuses spread across the Twin Cities of Minnesota, River Valley Church recently partnered with Engiven, a leading cryptoc...
Protecting source code
Wednesday, October 6, 2021 by Nigel Thorpe
Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...
Network visibility improves with Endace and Kemp Technologies
Tuesday, August 24, 2021 by Brittany Hainzinger
Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy.
Network visibility improves, helping teams reduce incident response times
The enhanced network flow metadata generation and intelligent traffic mon...
Microsoft DART team tracks 77k active web shells
Thursday, February 6, 2020 by Brittany Hainzinger
In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers.
According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...
Universal source code search engine emerges
Friday, November 22, 2019 by Richard Harris
Sourcegraph announced a new collaboration with GitLab, along with the world’s first universal source code search engine. The company has experienced exponential growth fueled by its expanding community of over 10,000 paid developers and tens of thousands of free open source developers who actively use its platform.
“GitLab and Sourcegraph are both oriente...
Instana announces new capabilities
Wednesday, November 6, 2019 by Austin Harris
Instana announced new capabilities that make it the only application management solution that can jump right into a log analysis tool with all context of the application and component under investigation.
“IT teams responsible for deploying and maintaining today’s mission critical applications must react quickly, especially when attacking service issues,&...
The DMV is selling driver data and Eve Maler weighs in
Tuesday, September 24, 2019 by Richard Harris
Motherboard broke the news on September 6 that Departments of Motor Vehicles (DMVs) around the nation have been making millions by selling drivers’ personally identifiable information to thousands of businesses. Amongst the DMVs customers are insurance agencies, tow companies, data brokers and even private investigators – all who are able to purchase records...
Artificial Intelligence capabilities in Siren 10.3 release
Wednesday, August 21, 2019 by Richard Harris
Siren, an investigative intelligence platform released Siren 10.3. The latest version of Siren launches five new artificial intelligence (AI) capabilities: entity resolution, deep learning-based predictive analytics and alerting, deep learning-based times series anomaly detection, real-time topic clustering for textual corpuses and associative model technology...
UK parliamentary report says Facebook should be regulated
Monday, February 18, 2019 by Austin Harris
Facebook and its executives have been labeled "digital gangsters" in a UK parliamentary report that calls for the company to be regulated, after an 18-month long investigation. The 180-page document says that Facebook willfully broke data privacy and competition laws.
A summary of the UK parliamentary report finds
Compulsory Code of Ethics for te...
IAST supports AppSec efficiencies while cutting costs and headaches
Monday, November 26, 2018 by Asma Zubair
It’s easy to feel passionate about interactive application security testing (IAST) in the world of application security. You see, IAST makes security testing almost invisible. It’s not something that requires a highly trained team to be brought in to carry out and analyze testing results. It doesn’t hold up other teams or processes from moving forward....
Changes to the way notifications work in iOS 12 you need to know
Wednesday, September 19, 2018 by Mike Herrick
iOS 12’s public release has brought about key changes to the way we do notifications. With these changes, Urban Airship urges app publishers to adopt customer-centric messaging best practices to accommodate new user behavior, improve notification visibility and maximize the value that their app can deliver. Granular user controls over notifications, new Grouped No...
DevSecOps showcase by Sumo Logic unravels all their new changes
Monday, September 17, 2018 by Richard Harris
Sumo Logic announced a number of new solutions and enhancements to its platform to empower enterprises to "win in the analytics economy." These innovations, as well as those from DevSecOps ecosystem partners, will be showcased this week at Sumo Logic’s user conference, Illuminate, in Burlingame, Calif. Illuminate will gather over 600 experts in machine d...
Questioning the future of privacy and the safety of personal identity
Thursday, June 28, 2018 by Richard Harris
While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR.
These findings and more are outlin...
New partnership emerges to simply IoT security
Wednesday, May 16, 2018 by Richard Harris
In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...
Perspective on the Microsoft v. US Supreme Court decision
Saturday, April 21, 2018 by Richard Harris
The U.S. Supreme Court has recently decided on a ruling for the Microsoft v. U.S. Supreme Court case. Because of the very important implications that this decision could have on the technology industry, we thought it best to get a legal opinion on what the ruling could mean in the future.Geoffrey Sant is a Partner at the international law firm Dorsey & Whitney LLP a...
Sensory brings low power wake words to mobile apps
Monday, April 9, 2018 by Richard Harris
Sensory has announced that it has made a significant breakthrough in running its TrulyHandsfree wake word and speech recognition AI engine directly on Android and iOS smartphone applications at low-power. As a software component, TrulyHandsfree can be adapted to any app without requiring special purpose hardware or DSPs to capture efficiencies in computing.Until now, al...
Cisco releases security connector app for iOS devices
Tuesday, January 2, 2018 by Austin Harris
Cisco announced the availability of Cisco Security Connector, a security app designed to give enterprises the deepest visibility and control over network activity on iOS devices, now in the App Store.Apple has designed iOS to be secure from the ground up and to be simple, intuitive, and powerful for users. By using iPhones and iPads with iOS 11 and Cisco Security Connec...
Device testing in the cloud empowers developers and ad fraudsters
Friday, December 8, 2017 by Richard Harris
Cloud technology has been a game-changer for many industries. It has reduced IT costs, made updating and upgrading systems much easier, allowed businesses to scale operations quickly, and it has enabled flexible work collaboration. The cloud also has major implications on how digital ads are tested and served to millions of people globally. The opportunity to seamlessly...
How to avoid flaky automated testing results
Tuesday, November 28, 2017 by Richard Harris
Flaky tests are the bane of any tester’s existence, forcing them to spend precious time on non-functional issues. This slows down the product lifecycle and lowers an organization’s confidence in functional testing, which also decreases the likelihood of development teams writing end-to-end tests.End-to-end tests measure readiness for deployment by ensuring that the appl...
Splunk expands machine learning capabilities
Monday, October 2, 2017 by Richard Harris
Splunk Inc. has announced expanded machine learning capabilities across its product portfolio with the release of their Enterprise 7.0, IT Service Intelligence (ITSI) 3.0, User Behavior Analytics (UBA) 4.0 and updates to their Cloud platform. Splunk also introduced an updated suite of solutions that apply analytics and machine learning to fraud and cloud monitoring use ...
Developers are most wary of these technologies being hacked
Wednesday, August 2, 2017 by Austin Harris
In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology.Propeller Insights conducted the recent survey of U.S.-based software developers for Netsparker from July 5-7, 2017.Government mo...
The future of cybersecurity in machine learning
Sunday, July 30, 2017 by Richard Harris
McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...
Capsule8 comes out of stealth to help protect Linux from attacks
Wednesday, February 15, 2017 by Austin Harris
Capsule8 has emerged from stealth mode to unveil its plans for the industry’s first container-aware, real-time threat protection platform designed to protect legacy and next-generation Linux infrastructures from both known and unknown attacks. Founded by experienced hackers John Viega, Dino Dai Zovi and Brandon Edwards, Capsule8 is being built on the real-world experien...
IBM Watson for cyber security has cognitive skills
Monday, February 13, 2017 by Richard Harris
According to IBM research, security teams sift through more than 200,000 security events per day on average, leading to over 20,000 hours per year wasted chasing false positives. The need to introduce cognitive technologies into security operations centers will be critical to keep up with the anticipated doubling of security incidents over the next five years and increa...
Security Intelligence Platform from Exabeam launched
Thursday, February 2, 2017 by Richard Harris
Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...
How Agile scrum development methodologies work in the Federal space
Thursday, January 26, 2017 by Richard Harris
Agile scrum development methodology has become a hot topic in recent news. More and more companies seem to be adopting this approach because they find that it saves the client time and money. Mobomo, a D.C. based tech company, works with many clients in the Federal space. They were able to give App Developer Magazine more insight into Agile Scrum Methodology and the imp...