AppSec 2023 predictions from Oxeye Security
Wednesday, February 8, 2023 by Freeman Lightner
Oxeye, the provider of award-winning cloud-native application security, announced five predictions expected to shape enterprise security spending in 2023. The predictions follow industry-wide research which shows the industry is shifting away from legacy software infrastructure and standardizing on cloud-native applications resulting in the need for new and more ef...
Mobile tower defense game stats
Tuesday, October 11, 2022 by Richard Harris
One of the most popular genres in mobile gaming is tower defense games. The mobile tower defense games market is especially popular on smartphones and tablets, where gamers can easily take them with them wherever they go. In addition, tower defense games are great for keeping people occupied on long road trips or flights, as they require little to no interaction from th...
Software-defined perimeter market is set to grow
Friday, August 5, 2022 by Brittany Hainzinger
The software-defined perimeter market is expected to increase at a CAGR of 14.3% from USD 7.4 billion in 2022 to USD 28.2 billion through 2032.
The increased need for policy-based security architecture to decrease network complexity and the growing demand for cloud-based applications are other factors expected to influence the software-defined perimeter market trends...
Mitigating API attacks in 2022
Wednesday, January 5, 2022 by Richard Harris
Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...
Amazon location service launches
Monday, August 23, 2021 by Freeman Lightner
Amazon Web Services, Inc. announced the general availability of Amazon Location Service, a new service that makes it easier and more cost-effective for customers to add location functionality to their applications without compromising on user privacy or data security. With Amazon Location Service, customers can embed location functionality in their applications usi...
DevSecOps will go mainstream this year
Tuesday, January 26, 2021 by Richard Harris
Cybercriminals love Shadow Code exploits because hacking a commonly used library or service can place the malicious code on hundreds or thousands of websites. For example, the widely used jQuery JavaScript library has been breached multiple times, leading to digital skimming attacks broadly across the e-commerce sector. Adding jQuery to an application without ...
5 mistakes businesses make in application development
Friday, October 23, 2020 by Mayur S Shah
5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development
Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...
Linux Foundation open sources Project OWL
Tuesday, March 10, 2020 by Richard Harris
The Linux Foundation announced Project OWL’s IoT device firmware effort will be hosted at the Foundation and is inviting developers worldwide to build mesh network nodes for global emergency communications networks. Project OWL, the winner of Call for Code 2018, is a cloud-based analytics tool that helps facilitate organization, whereabouts, and logistics for disa...
The cloud infrastructure startup war brewing
Tuesday, July 30, 2019 by Richard Harris
Cloud infrastructure startups have traditionally faced an uphill battle as they strive to gain footing against market leaders like AWS and Google. As a result, venture investors have tended to shy away from these startups on the assumption that the cloud platforms will eventually eradicate all competition in the market.
Eric Anderson, Principal at Scale Venture Partn...
5G meets IoT with Telit's New ME310G1 and ME910G1 modules
Monday, July 1, 2019 by Richard Harris
Telit announced the ME310G1 and ME910G1 modules, designed for mass-scale LTE-M and NB-IoT deployments that feature hundreds of thousands or millions of devices. Based on the new Qualcomm 9205 LTE modem and featuring optional 2G fallback, the modules also provide a future-proof foundation for IoT deployments that span legacy networks, 4G and 5G.
The ME310G1 and M...
One click microsegmentation platform from Edgewise
Thursday, June 20, 2019 by Brittany Hainzinger
Edgewise Networks launched its new platform that radically simplifies the creation and management of zero trust environments with one-click microsegmentation. In seconds, companies can stop internal network attacks that have bypassed perimeter defenses. The benefits include a significantly reduced network attack surface, operational efficiency for policy creation and ma...
AI for cybersecurity
Tuesday, November 27, 2018 by Richard Harris
As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...
Edge computing research reveals key nuances
Thursday, September 13, 2018 by Richard Harris
In early 2018, the AT&T Foundry launched an edge computing test zone in Palo Alto, CA to experiment with emerging applications upon this new network infrastructure paradigm. Edge computing is the act of moving storage and processing capabilities to the perimeter of the network - or geographically closer to the end-user. As next-gen applications require increasing pr...
The Curbside ARRIVE SDK for developers
Thursday, November 16, 2017 by Richard Harris
Curbside, a Silicon Valley startup that connects stores and restaurants with mobile customers, recently announced a public SDK for ARRIVE, Curbside’s predictive arrival technology, which accurately determines when someone is approaching a physical store - all without draining the customer’s smartphone battery.This tool is available to developers to incorporate into any ...
Inmarsat phone apps: Developers and satellite technology
Monday, October 30, 2017 by Richard Harris
Although you may not know it, we often use space satellites to communicate often in our daily lives. From GPS to weather predictions apps, without satellites the information that we have at our finger tips (or more specifically, our mobile phones) would be cut drastically. It follows that along with the constant innovation of mobile technology, satellite technology comp...
The HBO hack reveals how vulnerable data is to black hats
Thursday, August 31, 2017 by Richard Harris
The HBO hack is the latest in a string of high-profile hacks over the last two years (Dropbox, Yahoo!, UK Ministry of Health) where a handful of vulnerable servers were compromised and used to take down and steal information. Studies have shown the next year represent a turning point in the digitization of enterprise content. A recent Forrester study commissioned by Alf...
Why runtime application selfprotection is critical for app security
Tuesday, June 20, 2017 by David Strom
Today most of us go about implementing security from the outside in. The common practice is to start by defining a perimeter and trying to defend it with various security tools. Even though perimeters have been porous for more than a decade, we still can’t give up this notion that if we build a better wall we can keep our enterprises safer.Certainly that is where most e...
Alarm.com plans to use video enabled drones for security
Thursday, January 5, 2017 by Richard Harris
Alarm.com has announced plans to develop autonomous, video-enabled drone applications to extend the capabilities of smart home and business security systems. Their multi-sensor awareness and property intelligence, together with the Qualcomm Snapdragon Flight drone platform, will deploy drones to investigate unexpected activity. The drones will be designed to autonomousl...
Built.io adds on premises deployment and DevOps services
Tuesday, December 20, 2016 by Richard Harris
Built.io has announced Built.io Flow On-Prem, a new deployment option and architecture for its integration Platform-as-a-Service (iPaaS) Built.io Flow.By default, Built.io Flow operates 100 percent in the cloud, nothing to install locally, nothing to maintain. For hybrid integration architectures, an Enterprise Gateway allows to securely connect cloud-based systems...
Intel Security Enhances Unified Defense Architecture
Thursday, November 3, 2016 by Richard Harris
Intel Security has announced an enhanced unified defense architecture designed to empower organizations to more effectively protect a new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where ...
MobFox to Start Using Pixalate Blacklists to Help Mobile Advertisers Against Fraud
Thursday, August 11, 2016 by Richard Harris
MobFox has announced that it will start using Pixalate’s IP/User Agent Blacklists to measure fraud type and volume to optimize away from fraudulent traffic. The new IAB-approved Advertising Fraud Protection addition to the MobFox mobile advertising platform will help decrease the chances of ineffective ad spending for mobile and programmatic advertisers using the platfo...
Cloud Security Alliance Forms New Software Defined Perimeter for Infrastructure as a Service Initiative
Friday, March 4, 2016 by Richard Harris
The Cloud Security Alliance (CSA) is forming a new Software Defined Perimeter (SDP) for Infrastructure as a Service (IaaS) initiative. With the new program, the Alliance plans to demonstrate how an SDP can better protect IaaS services for enterprise usage, and deliver protection of on-premises and IaaS resources. The alliance’s rationale is that through understandi...
New Security Report Reveals Increased Threat for Mobile Applications
Sunday, February 21, 2016 by Stuart Parkerson
According to a new cyber security report, mobile applications increasingly have become top security threats plaguing enterprises over the past year. The details are outlined in the recently published Hewlett Packard Enterprise (HPE) Cyber Risk Report 2016.As the company points out in the report, traditional network perimeters are disappearing allowing attack surfaces to...
New Trustonic Platform Provides Mobile and IoT Developers with Device Security
Tuesday, February 9, 2016 by Richard Harris
Trustonic has released its "Trustonic Hybrid Protection" (THP) which offers built-in device security providing mobile and IoT developers with an adaptable security solution bringing together software and hardware secured solutions into one hybrid product. Trustonic combines advanced hardware enabled security solutions found in over 500 million devices with software...
Why Privileged Identity Management is Critical for Secure IT Outsourcing
Thursday, January 21, 2016 by Richard Harris
We visited with David McNeely, VP of Product Strategy at Centrify, to talk about why secure privileged identity management is critical as more of today’s businesses are outsourcing IT functions and relying on vendors to troubleshoot systems and applications. Centrify recently released a new privileged identity management solution supporting federated privileg...
Secure Cloud is a Reality
Wednesday, October 14, 2015 by Eric Naiburg
The move to the cloud has become a quick first step when looking to improve application delivery, performance and costs, yet in the back of everyone’s mind is whether or not the cloud can be secure. When it comes to the cloud these days however, security shouldn’t be a concern as long as you spend the time designing the right architecture for your application and ...
The Hidden Economics of the Cloud
Thursday, August 20, 2015 by Eric Naiburg
There are certainly clear economic benefits of moving to the cloud, whether public or private environments. These include scalability, pay for only what you use, high availability, shared resources, near instant scalability, and much more.However, when thinking whether or not to put an application in “the cloud”, with a managed cloud provider, there seem to be 2 initial...
A Look Ahead: The Top Ten Strategic Technology Trends for 2015
Wednesday, November 5, 2014 by Richard Harris
Its time for the prognosticators to get out their crystal balls and make predictions for 2015. And as it relates to the top 10 technology strategic trends, Gartner has done just that. Gartner defines a strategic technology trend as one with the potential for significant impact on an organization in the next three years. Factors that denote significant impact includ...
HP Launches Cloud Managed Application Self Protection Service
Friday, September 12, 2014 by Stuart Parkerson
HP has introduced HP Application Defender, a cloud-managed application self-protection service that provides immediate visibility and actively defends production applications against attacks.As HP said in the recent announcement, “As the number and complexity of enterprise applications grows, the attack surface for exploits increases exponentially, leaving enterpri...
Busy, Busy, Busy App Developers
Wednesday, June 26, 2013 by Richard Harris
The Summer of 2013 is in full swing now and with the closing of the WWDC, and the Google Developer Conference (I/O), and the starting of the Build Microsoft Conference - we app developers are finding it a bit difficult to keep up with all of the happenings around the globe. From changing API's to new OS's, all the way to enhanced hardware support and 3D game engines, it...