Microsoft misconfigurations expose millions of records globally
Monday, November 18, 2024 by Freeman Lightner
In September 2024, significant data exposure was discovered within Microsoft Power Pages, a low-code SaaS platform, due to misconfigured access controls. The exposure, which potentially affected millions of individuals, highlights the risks associated with excessive permissions granted to the platform's "Anonymous" and "Authenticated" user roles....
Mitigating API attacks in 2022
Wednesday, January 5, 2022 by Richard Harris
Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...
DevSecOps will go mainstream this year
Tuesday, January 26, 2021 by Richard Harris
Cybercriminals love Shadow Code exploits because hacking a commonly used library or service can place the malicious code on hundreds or thousands of websites. For example, the widely used jQuery JavaScript library has been breached multiple times, leading to digital skimming attacks broadly across the e-commerce sector. Adding jQuery to an application without ...
How to unlock mobiles hidden data trove without touching privacy
Wednesday, October 28, 2020 by Todd Wooten
If it feels like the privacy conversation has swallowed advertising, you’re not alone. Gartner predicts global compliance spending will reach $8 billion by 2022—a figure that doesn’t include dramatic operational changes for advertisers, especially around data usage and media buying. But all the talk about personally identifiable information (PII) misse...
GDPR and data security
Friday, September 18, 2020 by Jonathan Weicher
How has the General Data Protection Regulation (GDPR) affected your firm during the past two years? It has been nearly that long since GDPR went into effect across Europe, applicable for any organizations handling the personal information of European citizens. Since that time, it appears to be performing well up to expectations. Firms of all kinds find themse...
Ekata releases global identity verification dataset
Tuesday, June 16, 2020 by Brittany Hainzinger
Ekata announced the release of the latest innovation to its global identity verification dataset, Network Score. Network Score is a machine learning prediction that enables businesses to better identify good and bad customers based on a series of insights. The new dataset flags potentially risky digital transactions and fraudulent customers by analyzing the activity pat...
The DMV is selling driver data and Eve Maler weighs in
Tuesday, September 24, 2019 by Richard Harris
Motherboard broke the news on September 6 that Departments of Motor Vehicles (DMVs) around the nation have been making millions by selling drivers’ personally identifiable information to thousands of businesses. Amongst the DMVs customers are insurance agencies, tow companies, data brokers and even private investigators – all who are able to purchase records...
Build applications at speed with Cohesity Agile Dev
Thursday, September 12, 2019 by Freeman Lightner
Cohesity has announced the launch of Cohesity Agile Dev and Test, a new solution that addresses key bottlenecks organizations face in building applications at speed. It moves away from the request-fulfill model where developers request access to production-grade data and wait sometimes weeks for IT operations teams to provide the data needed to build...
GDPR report after one year
Wednesday, May 8, 2019 by Richard Harris
Data protection and privacy has always been important, but with the implementation of the European Union’s General Data Protection Regulation, companies are now thinking about it differently and are more critical of how they secure their data - especially as it pertains to sensitive and Personally Identifiable Information (PII).
With the one-year anniversary of...
Real world AI trained for business launched by Aible
Friday, March 22, 2019 by Richard Harris
Aible launched a Real World AI - trained for business impact, not accuracy. Aible lets business users create custom AI based on real cost-benefit tradeoffs and operational constraints. This innovation shows business users the expected business impact of the AI before deploying it. Aible makes AI accessible to anyone with knowledge of their business, no data s...
Detecting PII and sensitive data in motion becomes a reality
Tuesday, March 19, 2019 by Richard Harris
Io-Tahoe has released the latest version of its Smart Data Discovery platform, Smart Streaming Discovery - with the ability to perform real-time data discovery on a wide range of streaming data. The capability, believed to be the first of its kind, allows Io-Tahoe’s customers to discover PII (Personally Identifiable Information) and other sensitive data “in ...
The HBO hack reveals how vulnerable data is to black hats
Thursday, August 31, 2017 by Richard Harris
The HBO hack is the latest in a string of high-profile hacks over the last two years (Dropbox, Yahoo!, UK Ministry of Health) where a handful of vulnerable servers were compromised and used to take down and steal information. Studies have shown the next year represent a turning point in the digitization of enterprise content. A recent Forrester study commissioned by Alf...
InnoVault lets you embed endtoend data security encryption to apps
Friday, July 21, 2017 by Richard Harris
Tozny, which has built a secure, privacy-preserving and password-free mobile authentication system, has announced the launch of InnoVault, an easy-to-use toolkit allowing developers to embed end-to-end data security encryption capabilities into their websites, apps, or software. As a result, developers can now raise the level of their data security and privacy managemen...
Enterprise threat dubbed HospitalGown infests thousands of apps
Tuesday, June 6, 2017 by Richard Harris
Appthority, an enterprise mobile threat protection company, published research on a newly discovered backend data exposure vulnerability, dubbed HospitalGown, that highlights the connection between mobile apps and insecure backend databases containing enterprise data. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applica...
The intersection of data security and quality assurance
Monday, October 31, 2016 by Jessica Paddock
In today’s threat-laden environment, where production data is one of the chief targets of hackers, organizations developing software must expend both time and resources securing their production data. One of the simplest ways to ensure security for software testing activities is through the use of targeted, advanced data-handling solutions that can synthesize and virtua...
Paving the way to smarter phone security
Wednesday, October 19, 2016 by Robert Capps
75 million Smartphone users admit that while they are afraid of cyber attacks, they have not set a password for their smartphones according to the latest TransUnion’s Cyber Security Survey. While at first glance, this seems completely alarming and the ramifications could result in identity theft, it is also not surprising as consumers are not technologists and they just...
Study Show Companies Struggle with Big Data Management Performance Issues Because of Bad Data
Thursday, June 23, 2016 by Stuart Parkerson
StreamSets has announced the results of a survey that delved into the challenges of bad data on data management performance issues. The survey was conducted by Dimensional Research and included responses from 314 data management professionals globally.The primary research goal was to capture how companies manage the flow of big data. The research also investigated and d...
Why Companies Are Leveraging Hybrid Cloud for Apps
Wednesday, March 9, 2016 by Stuart Parkerson
Malcolm Ross, Vice President of Product at Appian recently spoke with us about the trend of deploying business applications in a hybrid cloud environment and the benefits of doing so. He has been directly involved in the implementation and development of enterprise software solutions for over 20 years, and has seen a lot of change in the industry over time.ADM: Wha...
5 Steps for Mastering App Data Collection for User Acquisition and Reengagement
Thursday, January 7, 2016 by Diego Meller
User acquisition and re-engagement are essential to the success of any app marketing strategy. Whether the goal is bringing back dormant users, acquiring quality users who complete in-app events (like bookings or purchases), or even showing custom ads to a segment of users who have achieved an in-app activity threshold, collecting the right app data plays a major role i...
Metalogix ControlPoint 7.0 Offers Security Monitoring for Suspicious SharePoint Activity
Thursday, November 5, 2015 by Stuart Parkerson
Metalogix has released ControlPoint 7.0, offering new, embedded security intelligence, and real-time situational awareness into suspicious SharePoint user activity to help prevent data breaches and leakages. With the combination of Metalogix Sensitive Content Manager and ControlPoint 7.0, the platform offers unified management to optimize the availability, performance, ...
Sense360 SDK Expands Mobile Location Aware Technology Capabilities
Tuesday, June 30, 2015 by Stuart Parkerson
Sense360 offers an SDK that provides the ability for an app to automatically and in the background detect when and what users are doing in the real world. Using this capability allows developers to build automated experiences that react to where users are and what they are doing. The platform can help app publishers monetize and market their mobile apps.The SDK manages ...
Datameer Now Offers Governance for Hadoop Analytics
Tuesday, June 9, 2015 by Richard Harris
Datameer has announced new data governance capabilities for its native Hadoop environment offering an end-to-end big data analytics application for Hadoop designed to make big data accessible. Datameer combines self-service data integration, analytics and visualization functionality.The platform addresses use cases which are now incorporating sensitive data sets such as...
IoT meets VR: The Next Concern Over Mobile Privacy
Wednesday, April 23, 2014 by Adam Grant
In the beginning of this year at the Consumer Electronics Show in Las Vegas, it seemed as if every sponsor and vendor was introducing a product that demonstrated a deep commitment to mobile technology and its interaction with the “Internet of Things.” Clearly, 2014 appeared to be the year mobile technology would move from a consumer’s interaction only with th...
Apple Officially Announces The iPhone 5C and 5S Take My Money!
Tuesday, September 10, 2013 by Richard Harris
First we learned about the iTunes festival, wait - there was a festival for iTunes?Next month Apple will officially shop the 700 millionth iOS device!iOS7 is up first, lets talk about what's new and has changed.Soon, we’ll witness an event where virtually overnight people download iOS 7 and get a whole new experience with their device” - CraigSiri is better now, with fe...