AI harms addressed by Anthropic
Wednesday, May 21, 2025 by Austin Harris
As AI capabilities rapidly advance, understanding and addressing the full spectrum of potential impacts becomes increasingly important. Today, we're sharing insights into our evolving approach to assessing and mitigating various harms that could result from our systems, ranging from catastrophic scenarios like biological threats to critical concerns like child safet...
Kong AI Gateway latest version released
Tuesday, April 8, 2025 by Richard Harris
Kong Inc. announced the launch of the latest version of Kong AI Gateway, which introduces new features to provide the AI security and governance guardrails needed to make GenAI and Agentic AI production-ready. New updates include automated Retrieval-Augmented Generation (RAG) pipelines aimed at preventing Large Language Model (LLM) hallucinations and a Personally Identi...
Security trade-offs and Xs vulnerabilities
Friday, March 21, 2025 by Richard Harris
The latest cyberattack on X raises an important question: Was this an external attack or a result of internal instability? While hacktivist group Dark Storm has claimed responsibility for the distributed denial-of-service (DDoS) attack, it is just as crucial to examine X’s own security posture, particularly in light of the drastic staffing cuts that followed Elon ...
AI coding security discussion with JFrog
Wednesday, February 19, 2025 by Richard Harris
Eyal Dyment, Vice President of Security Products at JFrog, shares his insights in this Q&A on the crucial considerations for developers and businesses when selecting an AI platform. With AI’s transformative role in coding and software development, Eyal addresses key security risks, the growing reliance on AI-powered technologies, and the steps developers can t...
Origination to distribution technology launched by 129Knots
Wednesday, February 12, 2025 by Richard Harris
Global fintech venture 129Knots has launched with a $10 million investment led by Sing Fuels. Backed by a $500 million deal pipeline, it is set to revolutionize the industry with its real-world asset origination to distribution (OTD) technology.
The OTD technology will reinvent deep-tier industries by delivering and deploying scalable liquidity solutions through secu...
Cybersecurity in 2025
Tuesday, February 4, 2025 by Richard Harris
Timothy Hollebeek shares his insights on the key cybersecurity trends shaping 2025, focusing on the evolving landscape of digital trust and identity. As quantum computing and AI continue to advance, they bring both groundbreaking innovations and new cybersecurity risks. The introduction of Google’s Willow chip signals a new era of quantum technology, accelerating ...
Cybersecurity supply chain risk management predictions for 2025
Thursday, January 16, 2025 by Austin Harris
DTS CEO and President Edward Tuorinsky shares his cybersecurity prediction for shaping the 2025 business landscape.
Cybersecurity in 2025 is like that party game where you whisper a phrase to the person next to you. One mistake is passed along to others, with funny outcomes. The stakes are higher, and the results are less amusing when data breaches or hacks travel al...
Top growth areas for developers in 2025
Monday, January 13, 2025 by Freeman Lightner
There are many ways artificial intelligence can assist developers today, from helping to streamline the development process by instantly detecting and fixing errors to summarizing code and generating documentation. A recent survey corroborated that 76% of developers are using or planning to use AI coding tools. Respondents cited several benefits for using AI such as inc...
App marketing for older apps
Wednesday, January 8, 2025 by Richard Harris
App Store Optimization (ASO) is a critical component of app marketing, particularly for older apps that need to regain or maintain market visibility. ASO is more than just keyword optimization; its a holistic approach. It involves multiple levers, including keyword, creative, and engagement optimizations. A comprehensive ASO strategy can significantly enhance an app'...
API Security Perspectives 2025 report from Kong Inc
Monday, December 30, 2024 by Richard Harris
Kong Inc. released findings from their API Security Perspectives 2025: AI-Enhanced Threats and API Security Report which highlights today’s API security landscape and how new developments in AI will impact it. Most notably, 25% of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75% of respondents expressing serious concern a...
App development predictions for 2025 from Kochava
Friday, December 20, 2024 by Richard Harris
As we approach 2025, app development is rapidly evolving. Technological advancements, changes in user expectations, and emerging global trends are redefining what it means to build, deploy, and use mobile and web applications.
2025 app development predictions from Amro Hassan at Kochava
With groundbreaking advancements in artificial intelligence, connectivity, and...
Mobile operators in France unite to protect digital identities
Monday, December 16, 2024 by Brittany Hainzinger
As part of the global GSMA Open Gateway initiative, France's four leading mobile operators – Bouygues Telecom, Free, Orange and SFR – announced they will join forces to provide services designed to help app developers and enterprises tackle online fraud and protect the digital identities of mobile customers.
Mobile operators in France unite to protect digit...
Agentic AI app development streamlined with new Capella AI services
Monday, December 16, 2024 by Richard Harris
Couchbase, Inc. unveiled Capella AI Services to help enterprises address the growing data challenges of AI development and deployment and streamline how they build secure agentic AI applications at scale. The comprehensive AI Services, including model hosting, automated vectorization, unstructured data preprocessing and AI agent catalog services, allow organizations to ...
AI fraud prevention solution launched
Tuesday, December 10, 2024 by Richard Harris
AppsFlyer announced the launch of an industry-leading AI enhancement layer on top of its Protect360 fraud prevention solution. Designed to address the growing challenges posed by increasingly sophisticated fraud tactics, the new AI layer leverages multiple machine learning models to deliver unmatched fraud detection and deterrence capabilities – offering customers...
Anticipatory design faces challenges in business implementation
Thursday, November 14, 2024 by Russ Scritchfield
In the rapidly evolving digital landscape, anticipatory design is emerging as a game-changer. This innovative approach, driven by Artificial Intelligence (AI), Machine Learning (ML), and Big Data (BD), aims to enhance user experience by predicting and addressing needs before they are even articulated. However, despite its promising potential, many businesses are grappli...
User interfaces and handling risky actions
Monday, November 4, 2024 by Richard Harris
In the digital realm, where user interfaces serve as the bridge between humans and technology, the potential for error is ever-present. This is aptly summarized by Murphy's Law: "Anything that can go wrong will go wrong." The challenge for designers and developers is to anticipate these potential pitfalls and design interfaces that prevent errors or minimi...
Increasing cyber threats from artificial intelligence
Wednesday, October 9, 2024 by Freeman Lightner
The UK Cybersecurity M&A market has grown significantly over the past decade, with the deal volume trend line increasing, and the sector continuing to attract significant investment from Private Equity, alongside larger corporates consolidating emerging technologies to counter increasingly sophisticated threats.
The UK National Cyber Security Centre has...
Vulnerabilities in Apple products alert
Monday, September 30, 2024 by Richard Harris
CERT-In has recently issued Advisory CIAD-2024-0046, highlighting multiple high-severity vulnerabilities in Apple products. The vulnerabilities affect a wide range of Apple software, including iOS versions prior to 18, iPadOS versions prior to 18, macOS Sonoma versions prior to 14.7, macOS Ventura versions prior to 13.7, and the upcoming macOS Sequoia versions prior to ...
AWS introduces Mithra advanced threat intelligence neural network
Thursday, August 15, 2024 by Freeman Lightner
In a recent blog post from AWS, Amazon Chief Information Security Officer CJ Moses detailed the robust threat intelligence capabilities that safeguard AWS customers. Through tools like Mithra and MadPot, AWS collects and analyzes vast data, identifying and neutralizing threats with unparalleled accuracy and speed. AWS's proactive approach to sharing high-fidelity th...
Generative AI in Application Security report from Checkmarx
Monday, August 12, 2024 by Richard Harris
Checkmarx, the in-cloud-native application security provider, has published its Seven Steps to Safely Use Generative AI in Application Security report, which analyzes key concerns, usage patterns, and buying behaviors relating to the use of AI in enterprise application development. The global study exposed the tension between the need to empower both...
Apple interviews app creators
Tuesday, July 30, 2024 by Freeman Lightner
Around the world, developers are building apps that break down barriers across gender, race, socioeconomic status, language, and physical ability.
In celebration of Entrepreneur Camp’s fifth anniversary, Apple spoke with alumni app creators whose apps are shaking things up in education, fitness, and mental health. All three women have participated in the immers...
NPUs disrupting Nvidia AI dominance
Tuesday, July 23, 2024 by Brittany Hainzinger
The semiconductor market is projected to reach around $400 billion by 2030*, with AI semiconductors expected to constitute over 30% of this market, up from 20% today. AI has recently dominated headlines with the launch of ChatGPT, Claude, and a host of other GenAI platforms. This has prompted countless companies to examine how they can implement AI into their products, ...
SaaS integration challenges explained by Prismatic
Wednesday, July 17, 2024 by Richard Harris
In this Q&A, we delve into the world of SaaS integrations with the CEO and co-founder of Prismatic Michael Zuercher. He shares valuable insights on the challenges companies face when implementing integrations, including security concerns, scaling difficulties, and the impact on core product development. Michael offers guidance on mitigating security risks and evalua...
Safer Bitcoin alternative launched from DLC.Link
Monday, April 15, 2024 by Brittany Hainzinger
DLC.Link has launched its key offering, dlcBTC. The dlcBTC token is a safer wrapped Bitcoin alternative, utilizing Discreet Log Contracts (DLC), a Bitcoin scaling technology enabled in Bitcoin’s Taproot upgrade two years ago. dlcBTC represents a significant advancement in decentralized finance (DeFi), allowing users to seamlessly utilize Bitcoin across the Ethereu...
AI Agent Builder announced from OutSystems
Wednesday, March 20, 2024 by Richard Harris
OutSystems announced AI Agent Builder, a new innovative solution in the OutSystems Developer Cloud platform that makes it easy for IT leaders to incorporate generative AI (GenAI) powered applications into their digital transformation strategy, as well as govern the use of AI to ensure standardization and security.
AI Agent Builder is the latest execution of OutSystem...
TikTok ban: A developers guide
Monday, March 18, 2024 by Freeman Lightner
In the event of a comprehensive prohibition of TikTok across the United States, the ramifications for the digital ecosystem would be substantial, necessitating immediate and strategic responses from both the developer community and the platform's extensive user base. This scenario would require a multifaceted approach to compliance, with developers in particular fac...
ONCD asks software manufacturers to adopt memory safe languages
Tuesday, March 5, 2024 by Richard Harris
The White House Office of the National Cyber Director (ONCD) has released a new report asking software manufacturers to adopt memory-safe programming languages to help reduce vulnerabilities from entering the supply chain.
"For thirty-five years, memory safety vulnerabilities have plagued the digital ecosystem, but it doesn’t have to be this way. This repo...
GenAI corporate landscape transformations
Tuesday, January 30, 2024 by Freeman Lightner
The latest studies from Boston Consulting Group (BCG) and MIT Technology Review shed light on a pivotal moment in the corporate world, characterized by the swift rise of Generative AI (GenAI) and its profound impact on business operations, filmmaking, and beyond.
GenAI: Transforming the corporate landscape
According to BCG’s comprehensive survey of over 1,40...
HiPEAC 2024 conference to focus on edge AI
Friday, January 12, 2024 by Richard Harris
Bringing computing systems together from all over the world, the nineteenth edition of the HiPEAC conference will take place in Munich on 17-19 January 2024. A highlight of the European computing systems' community calendar, the event offers both unparalleled networking opportunities and the chance to identify priorities for future directions in the field. This...
AI cybersecurity impacts according to NetLib Security
Monday, December 18, 2023 by Richard Harris
This is an easy call to make: NetLib Security predicts that Artificial Intelligence - Generative AI - will continue to heavily impact the world of cybersecurity, upping the game for defensive players, while giving cybercriminals more tools on the offensive side.
2023 was a year in which AI seemed suddenly to be everywhere. Although AI is not a new field, ChatGPT and ...
Generative AI predictions for 2024 from WinWire
Monday, December 18, 2023 by Richard Harris
As much as it's in the news, AI is by no means a new development. It has been more than three decades since Deep Blue beat Garry Kasparov, the Russian chess champion. It has been over a decade since Watson outperformed several Jeopardy champions.
That was all AI. It's not a sudden arrival. It has evolved and gone through several iterations. AI-powered recomme...
API security risks report exposes Netflix and Wordpress
Monday, November 27, 2023 by Richard Harris
Wallarm, the end-to-end API and app security company, announced the release of its Q3-2023 Wallarm API ThreatStats report. The quarterly report details the surge in threats centered around APIs and uncovers critical vulnerabilities, like injections and API data leaks, that have recently impacted leading firms, including Netflix, VMware, and SAP.
The new report i...
API management capabilities from Traefik Labs
Monday, November 13, 2023 by Richard Harris
Traefik Labs, the creator of Traefik Proxy, the ingress controller with more than 3 billion downloads, announced that they added new capabilities to Traefik Hub, the Kubernetes native and GitOps-driven Application Programming Interface (API) management solution. This latest update modernizes API runtime operations for platform teams that frequently encounter change...
Red Hat AI revealed at KubeCon 2023
Friday, November 10, 2023 by Richard Harris
At KubeCon 2023 Red Hat made a number of announcements for its hybrid cloud portfolio, including the general availability of Red Hat Device Edge and Red Hat OpenShift 4.14; new certified plug-ins for the Backstage community; and Red Hat’s vision for AI and automation.
Red Hat Device Edge is now generally available
Red Hat Device Edge aggregates an enterprise...
Agile software development is shaping the future of AI and ML
Monday, October 30, 2023 by Freeman Lightner
The use of artificial intelligence (AI) and machine learning (ML) has become widespread for businesses across virtually every sector, and the rapid pace of adoption is showing no signs of relenting: research by McKinsey suggests that AI could enable automation of up to 70% of business activities between now and 2030.
According to Damian Winczewski, Head of Agile at S...