ONCD asks software manufacturers to adopt memory safe languages
Tuesday, March 5, 2024 by Richard Harris
The White House Office of the National Cyber Director (ONCD) has released a new report asking software manufacturers to adopt memory-safe programming languages to help reduce vulnerabilities from entering the supply chain.
"For thirty-five years, memory safety vulnerabilities have plagued the digital ecosystem, but it doesn’t have to be this way. This repo...
Digital trust and security predictions from DigiCert
Tuesday, December 12, 2023 by Richard Harris
Mike Nelson, along with a team of experts at DigiCert looks back at the past year's security developments and makes some bold predictions of technology, identity, and digital trust. Here are DigiCert's top predictions:
Prediction 1: Senior executives will become more knowledgeable about post-quantum cryptography, and companies will accelerate their investment...
Security compliance predictions for 2022
Tuesday, January 18, 2022 by Freeman Lightner
Edward Tuorinsky is the Managing Principal of DTS, a Service-Disabled Veteran-Owned Small Business, that provides information technology and management consulting services in the areas of program management, governance, strategic planning, organization advancement, business process efficiency, software development, system integration, and learning enhancement solutions....
Improving security posture with static application security testing
Friday, February 12, 2021 by Tim Jarrett
Amid the worldwide pursuit of digital transformation, the software has seen a meteoric rise, and application security has become paramount. As more companies become software-centric, they publish more applications, increasing the risk vulnerable code will be released. To help reduce this risk, static application security testing (SAST) can help dev teams find and fix we...
Breakthrough in voice biometric optimization comes with IDVoice 2.11
Monday, January 27, 2020 by Freeman Lightner
ID R&D announced the newest release of its voice biometric solution, IDVoiceTM version 2.11. This release delivers a breakthrough in voice biometric optimization with an AI-based SDK of under 1MB, enabling voice biometrics to be implemented on the edge - from chips to IoT devices - for a new era of security and personalization in the voice-enabled UX.
IDVoice, ID...
Evolve VM showcasing at Microsoft Ignite
Thursday, November 7, 2019 by Brittany Hainzinger
Adaptiva announced that it will showcase Evolve VM at Microsoft Ignite. This groundbreaking, complete vulnerability life cycle product automatically assesses endpoints for thousands of vulnerability, compliance, and health issues and instantly remediates them as soon as they are detected. Utilizing NIST's National Vulnerability Database and National Checklist Progra...
Post-quantum computing security
Wednesday, November 6, 2019 by Richard Harris
There is a brewing fear about Quantum computing because of the power behind moving quantum bits around in such blinding speeds that some say, will instantly break every encryption algorithm on the Internet today. DigiCert Inc. has released the results of a new survey titled, "Quantum's Peril & Promise" that highlights the ...
Silicon Labs Series 2 mesh networking modules are out now
Thursday, September 26, 2019 by Freeman Lightner
Silicon Labs has launched a new portfolio of highly integrated, secure Wireless Gecko modules that reduce development cost and complexity, making it easier to add robust mesh networking connectivity to a wide range of Internet of Things (IoT) products. The new MGM210x and BGM210x Series 2 modules support leading mesh protocols (Zigbee, Thread, and Bluetoo...
Videoselfie authentication tool launches
Tuesday, February 19, 2019 by Richard Harris
Jumio announced the launch of Jumio Authentication, a new video-selfie authentication that uses biometrics for user authentication, that could be ideal for account logins and high-risk scenarios (e.g., logging in from a foreign IP address or authorizing high-risk transactions such as wire transfers and online purchases). Secure selfie authentication can also be use...
New partnership emerges to simply IoT security
Wednesday, May 16, 2018 by Richard Harris
In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...
Exostar launches mobile multifactor authentication solution
Friday, December 15, 2017 by Richard Harris
Exostar has announced the general availability of a new option for multifactor authentication. Exostar Mobile ID is a smartphone or tablet app-based authenticator for which it has achieved Level 3 SAFE-BioPharma certification under the FICAM trust framework. The solution turns an individual’s mobile device into a secure hardware-based second factor for access control to...
Sending out an S.O.S. for SMS
Wednesday, October 4, 2017 by Will LaSala
What a difference a year makes. Just one year after the National Institute of Standards and Technology issued guidance that found SMS is insecure and no longer suitable as a strong authentication mechanism, it has walked all of that back.At the time the original draft was published, it was highly unusual for any US government agency to get out in front of the security i...
Behavioral and biometric mobile authentication will end passwords
Friday, September 15, 2017 by David Vergara
You can say this about passwords: they're incredibly resilient. Not in a bulletproof kind of way but, more precisely, in terms of how long they've been around. According to Robert Svensson in his book "From Hacking to Report Writing: An Introduction to Security and Penetration," the first computer system to use passwords was built by researchers at the Massachusetts Ins...
InnoVault lets you embed endtoend data security encryption to apps
Friday, July 21, 2017 by Richard Harris
Tozny, which has built a secure, privacy-preserving and password-free mobile authentication system, has announced the launch of InnoVault, an easy-to-use toolkit allowing developers to embed end-to-end data security encryption capabilities into their websites, apps, or software. As a result, developers can now raise the level of their data security and privacy managemen...
ImmuniWeb Mobile launches to offer better mobile security testing
Wednesday, March 15, 2017 by Richard Harris
High-Tech Bridge announces the launch of ImmuniWeb Mobile as part of ImmuniWeb Application Security Testing Platform. The new offering will provide comprehensive assessment of iOS and Android mobile applications, mobile infrastructure backend and data channel encryption. All ImmuniWeb Mobile packages are provided with a zero false-positives SLA. The mobile application s...
Humans are still the biggest threat to cyber security report shows
Saturday, December 17, 2016 by Christian Hargrave
Global technology company Nuix have released the findings from its third annual survey of corporate information security practitioners who almost universally agreed that human behavior was their largest security threat. While businesses were investing to develop broad and mature cybersecurity capabilities, many survey respondents were uncertain about the most effective ...
Cloud Security Alliance Issues Mobile Application Security Testing Report
Monday, August 1, 2016 by Stuart Parkerson
The Cloud Security Alliance has released a new report surrounding its Mobile Application Security Testing Initiative. The purpose of the report is to provide the Alliance’s insight into building out a roadmap for establishing a more secure cloud ecosystem to protect mobile applications.The Alliance’s Mobile Application Security Testing (MAST) Initiative offers...
Transfer Data Fast with the New AWS Snowball and Kinesis Firehose
Sunday, October 11, 2015 by Stuart Parkerson
Amazon Web Services has released AWS Snowball and Amazon Kinesis Firehose both of which offer two new capabilities to help AWS users more quickly and cost-effectively transfer data of all types and sizes to the AWS Cloud. AWS Snowball is a petabyte-scale data transport appliance that can securely transfer 50 TB per appliance of data into and out of AWS. Amazon Kine...
How to Avoid the Pitfalls of Poor Localization
Wednesday, April 22, 2015 by Françoise Henderson
The appetite for mobile and desktop apps is just as strong internationally as it is in the United States, as consumers and businesses rely on software for both work and play. Data from the mobile analytics firm Flurry found that mobile web users in 2014 spent up to 86 percent of their time on apps – an increase from 80 percent the year before.Of course, that only covers...
Mobile App Testing Workflow Program Used by Military Now Available as Open Source
Monday, April 28, 2014 by Richard Harris
The National Institute of Standards and Technology (NIST) has released AppVet, a free and open source web application for managing the mobile app vetting process. "AppVet aims to simplify the complexity of manually testing apps through multiple test tools," explains Steve Quirolgico, a computer scientist at NIST and a member of the team developing AppVet.AppVe...