Veracode acquires Longbow Security
Thursday, April 18, 2024 by Freeman Lightner
Veracode announced the acquisition of Longbow Security, a security risk management platform for cloud-native environments. The acquisition marks the next exciting phase of Veracode, underscoring the company’s commitment to help organizations effectively manage and reduce application risk across the growing attack surface.
The integration of Longbow in...
Cybersecurity performance optimization updates from Logpoint
Friday, February 2, 2024 by Freeman Lightner
Logpoint is releasing new capabilities to its Converged SIEM platform, enhancing threat detection and security operations and streamlining case management. Organizations can focus on essential security matters with the new capabilities by reducing workload, simplifying automation, and freeing up resources.
The new release delivers increased system stability and ...
Runtime code review from AppMap enhances productivity
Tuesday, November 14, 2023 by Richard Harris
AppMap has announced its innovative Runtime Code Review solution that will transform software quality and the developer experience. AppMap's mission is to deliver actionable insights to developers where they work, and AppMap continues to deliver on the promise with its latest release for the GitHub Marketplace.
Unexpected runtime defects account fo...
Is Temu safe, legit, or dangerous: Perspective from an app developer
Wednesday, July 12, 2023 by Richard Harris
Temu is a shopping website, and app chalked full of products from overseas at ridiculously dirt cheap prices. They have almost everything you can imagine too. From laser pointer slingshots to Expresso makers, the entire ecosystem is built around keeping you shopping with a gamified experience, and it gets addicting quickly.
Some of the ADM staff have placed orders an...
Cryptocurrency donations for churches
Thursday, January 27, 2022 by Richard Harris
Each year, River Valley Church hosts an annual event called Kingdom Builders, where they ask church attendees to give generously to different projects including global missions, future leadership development, and local church investment. With eight campuses spread across the Twin Cities of Minnesota, River Valley Church recently partnered with Engiven, a leading cryptoc...
Protecting source code
Wednesday, October 6, 2021 by Nigel Thorpe
Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...
Network visibility improves with Endace and Kemp Technologies
Tuesday, August 24, 2021 by Brittany Hainzinger
Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy.
Network visibility improves, helping teams reduce incident response times
The enhanced network flow metadata generation and intelligent traffic mon...
Microsoft DART team tracks 77k active web shells
Thursday, February 6, 2020 by Brittany Hainzinger
In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers.
According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...
Instana announces new capabilities
Wednesday, November 6, 2019 by Christian Hargrave
Instana announced new capabilities that make it the only application management solution that can jump right into a log analysis tool with all context of the application and component under investigation.
“IT teams responsible for deploying and maintaining today’s mission critical applications must react quickly, especially when attacking service issues,&...
The DMV is selling driver data and Eve Maler weighs in
Tuesday, September 24, 2019 by Richard Harris
Motherboard broke the news on September 6 that Departments of Motor Vehicles (DMVs) around the nation have been making millions by selling drivers’ personally identifiable information to thousands of businesses. Amongst the DMVs customers are insurance agencies, tow companies, data brokers and even private investigators – all who are able to purchase records...
Artificial Intelligence capabilities in Siren 10.3 release
Wednesday, August 21, 2019 by Richard Harris
Siren, an investigative intelligence platform released Siren 10.3. The latest version of Siren launches five new artificial intelligence (AI) capabilities: entity resolution, deep learning-based predictive analytics and alerting, deep learning-based times series anomaly detection, real-time topic clustering for textual corpuses and associative model technology...
UK parliamentary report says Facebook should be regulated
Monday, February 18, 2019 by Christian Hargrave
Facebook and its executives have been labeled "digital gangsters" in a UK parliamentary report that calls for the company to be regulated, after an 18-month long investigation. The 180-page document says that Facebook willfully broke data privacy and competition laws.
A summary of the UK parliamentary report finds
Compulsory Code of Ethics for te...
Changes to the way notifications work in iOS 12 you need to know
Wednesday, September 19, 2018 by Mike Herrick
iOS 12’s public release has brought about key changes to the way we do notifications. With these changes, Urban Airship urges app publishers to adopt customer-centric messaging best practices to accommodate new user behavior, improve notification visibility and maximize the value that their app can deliver. Granular user controls over notifications, new Grouped No...
DevSecOps showcase by Sumo Logic unravels all their new changes
Monday, September 17, 2018 by Richard Harris
Sumo Logic announced a number of new solutions and enhancements to its platform to empower enterprises to "win in the analytics economy." These innovations, as well as those from DevSecOps ecosystem partners, will be showcased this week at Sumo Logic’s user conference, Illuminate, in Burlingame, Calif. Illuminate will gather over 600 experts in machine d...
Questioning the future of privacy and the safety of personal identity
Thursday, June 28, 2018 by Richard Harris
While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR.
These findings and more are outlin...
Perspective on the Microsoft v. US Supreme Court decision
Saturday, April 21, 2018 by Richard Harris
The U.S. Supreme Court has recently decided on a ruling for the Microsoft v. U.S. Supreme Court case. Because of the very important implications that this decision could have on the technology industry, we thought it best to get a legal opinion on what the ruling could mean in the future.Geoffrey Sant is a Partner at the international law firm Dorsey & Whitney LLP a...
Device testing in the cloud empowers developers and ad fraudsters
Friday, December 8, 2017 by Richard Harris
Cloud technology has been a game-changer for many industries. It has reduced IT costs, made updating and upgrading systems much easier, allowed businesses to scale operations quickly, and it has enabled flexible work collaboration. The cloud also has major implications on how digital ads are tested and served to millions of people globally. The opportunity to seamlessly...
How to avoid flaky automated testing results
Tuesday, November 28, 2017 by Richard Harris
Flaky tests are the bane of any tester’s existence, forcing them to spend precious time on non-functional issues. This slows down the product lifecycle and lowers an organization’s confidence in functional testing, which also decreases the likelihood of development teams writing end-to-end tests.End-to-end tests measure readiness for deployment by ensuring that the appl...
Splunk expands machine learning capabilities
Monday, October 2, 2017 by Richard Harris
Splunk Inc. has announced expanded machine learning capabilities across its product portfolio with the release of their Enterprise 7.0, IT Service Intelligence (ITSI) 3.0, User Behavior Analytics (UBA) 4.0 and updates to their Cloud platform. Splunk also introduced an updated suite of solutions that apply analytics and machine learning to fraud and cloud monitoring use ...
Developers are most wary of these technologies being hacked
Wednesday, August 2, 2017 by Christian Hargrave
In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology.Propeller Insights conducted the recent survey of U.S.-based software developers for Netsparker from July 5-7, 2017.Government mo...
The future of cybersecurity in machine learning
Sunday, July 30, 2017 by Richard Harris
McAfee, a cybersecurity company, has announced several new innovations that expand machine learning and automation capabilities to strengthen human-machine teams. Plus, McAfee announces support of OpenDXL.com, a new, independent collaboration portal that offers forums and free apps, giving OpenDXL users easy access to ideas and resources available for application integr...
Capsule8 comes out of stealth to help protect Linux from attacks
Wednesday, February 15, 2017 by Christian Hargrave
Capsule8 has emerged from stealth mode to unveil its plans for the industry’s first container-aware, real-time threat protection platform designed to protect legacy and next-generation Linux infrastructures from both known and unknown attacks. Founded by experienced hackers John Viega, Dino Dai Zovi and Brandon Edwards, Capsule8 is being built on the real-world experien...
IBM Watson for cyber security has cognitive skills
Monday, February 13, 2017 by Richard Harris
According to IBM research, security teams sift through more than 200,000 security events per day on average, leading to over 20,000 hours per year wasted chasing false positives. The need to introduce cognitive technologies into security operations centers will be critical to keep up with the anticipated doubling of security incidents over the next five years and increa...
Security Intelligence Platform from Exabeam launched
Thursday, February 2, 2017 by Richard Harris
Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...
How Agile scrum development methodologies work in the Federal space
Thursday, January 26, 2017 by Richard Harris
Agile scrum development methodology has become a hot topic in recent news. More and more companies seem to be adopting this approach because they find that it saves the client time and money. Mobomo, a D.C. based tech company, works with many clients in the Federal space. They were able to give App Developer Magazine more insight into Agile Scrum Methodology and the imp...
Cyberbit's SOC 3D automation updates and what you should know
Tuesday, December 20, 2016 by Richard Harris
Cyberbit just announced a new version of its SOC 3D automation and orchestration platform that increases productivity and effectiveness of the SOC and substantially reduces incident response times. The new platform integrates with all major SIEM and security solutions, automates SOC runbooks and workflows, and prioritizes incidents according to their business impact. It...
Intel Security Enhances Unified Defense Architecture
Thursday, November 3, 2016 by Richard Harris
Intel Security has announced an enhanced unified defense architecture designed to empower organizations to more effectively protect a new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where ...
Datadog announces new machine learning based feature called Anomaly Detection
Thursday, October 27, 2016 by Richard Harris
Datadog, a monitoring service for modern cloud environments, has announced the release of a new machine-learning based feature called Anomaly Detection. This will allow engineering teams to quickly identify abnormal behavior within rapidly changing cloud environments, based on historical patterns that are impossible to track manually.Anomaly Detection works by constantl...
Splunk Harnesses Machine Learning for New Innovations
Tuesday, September 27, 2016 by Richard Harris
Splunk Inc. has released new versions of Splunk Enterprise, Splunk IT Service Intelligence (ITSI), Splunk Enterprise Security (ES) and Splunk User Behavior Analytics (UBA). Available on-premises or in the cloud, the newest versions of Splunk solutions leverage machine learning to make it faster and easier to maximize the value machine data can deliver to organizations.A...
Partnership Between Developers, Publishers and Platforms Is Key Says New Report
Monday, September 12, 2016 by Richard Harris
The Application Developers Alliance has released the result of a global survey of mobile app developers and publishers: Competition in the Mobile App Ecosystem. The report shows a healthy mobile app market and an industry that is concerned about being misrepresented and sees unnecessary intervention from external authorities.In the context of the European Commission’s o...
New Relic Now Offers Browser Monitoring for SPAs
Tuesday, July 12, 2016 by Stuart Parkerson
New Relic has announced updates to its New Relic Browser providing new support for web applications built with single-page application (SPA) frameworks and libraries. When combined with New Relic APM, the browser monitoring for SPAs will allow users to have end-to-end visibility of their application’s performance, from the front-end to the services it is running on.New ...
Microsoft Cloud App Security is Now Generally Available
Wednesday, April 13, 2016 by Richard Harris
The Microsoft Cloud App Security platform is now generally available offering a cloud-delivered service built for cloud apps.The platform offers two main components: (1) Discovery of cloud usage in a company using log-based traffic analysis and (2) Granular control for sanctioned apps leveraging API-based integration. With platform’s tools to help uncover Shadow IT, ass...
Distil Networks Releases API Security Service
Thursday, April 7, 2016 by Richard Harris
Distil Networks has released a new Distil API Security service that protects vulnerable Application Programming Interface (API) endpoints from malicious traffic. The Distil API Security solution protects all types of APIs including those serving web browsers, mobile applications, and Internet of Things (IoT) connected devices. Distil API Security defends against de...
How March Madness Impacts Enterprise Mobile Data Usage and BYOD Security
Tuesday, April 5, 2016 by Richard Harris
Oversized events like March Madness and the Olympics not only can cause decreased productivity from employees, but also may increase security risks for companies whose employees are using devices that access corporate data. We visited with Michael Covington, VP Product for Wandera, to discuss research the company conducted during the NCAA basketball tournament to learn ...
Out of Band Update for Flash
Wednesday, March 23, 2016 by James Rowney
MS16-036 is a critical out of band update and resolves 20 vulnerabilities in Adobe Flash Player on all supported versions of Windows Server 2012, Windows Server 2012 R2, Windows 8.1, Windows RT 8.1, and Windows 10. This bulletin addresses vulnerabilities by updating the Adobe Flash libraries contained within all supported versions of Internet Explorer and Microsoft...