Cybersecurity performance optimization updates from Logpoint
Friday, February 2, 2024 by Freeman Lightner
Logpoint is releasing new capabilities to its Converged SIEM platform, enhancing threat detection and security operations and streamlining case management. Organizations can focus on essential security matters with the new capabilities by reducing workload, simplifying automation, and freeing up resources.
The new release delivers increased system stability and ...
Tech and mobile app predictions from Inflectra for 2024
Wednesday, January 3, 2024 by Richard Harris
The year 2024 is upon us and, with it, some of the biggest changes technology has ever brought to multiple industries. Technological innovations and mobile applications promise to create seismic shifts across countless sectors, from the healthcare industry and manufacturing to military and defense.
Below are five ways developments in technology and mobile application...
App security threat report results from Digital Ai
Thursday, October 19, 2023 by Richard Harris
Digital.ai announced the results of its 1st annual Application Security Threat Report, illuminating and quantifying the risks to applications in the wild. The results reveal that 57% of all monitored apps are under attack, with gaming (63%) and FinServ (62%) the most likely to be attacked. The study found no correlation between an app’s popularity and likelihood o...
Fake app reviews impact developers more than you think
Thursday, June 29, 2023 by Freeman Lightner
Developers are well aware that a significant portion of online reviews for products and services, including those on popular platforms like Amazon, eBay, and TripAdvisor, are in fact fake. The issue of fake app reviews has become an increasingly pressing concern. These deceptive reviews have wide effects on both developers and consumers alike, significantly impacting th...
PCI DSS JavaScript compliance tool free from Jscrambler
Thursday, June 29, 2023 by Brittany Hainzinger
Jscrambler announced the launch and immediate availability of its free PCI DSS JavaScript Compliance Tool to ensure granular and flexible capacity to meet the stringent new requirements introduced by version 4.0 of the Payment Card Industry Data Security Standards (PCI DSS v4.0). This free assessment tool provides organizations of all sizes with clarity and si...
Oxeye discovers vulnerability in HashiCorp Vault Project
Tuesday, April 25, 2023 by Freeman Lightner
Oxeye announced the discovery of a new vulnerability in the HashiCorp Vault Project that has now been patched. HashiCorp Vault is a popular identity-based secret and encryption management system used to control access to API encryption keys, passwords, and certificates. The vulnerability was automatically discovered and reported by the Oxeye Platform during a deployment...
API governance explained and why it matters
Tuesday, March 28, 2023 by Darshan Shivashankar
APIs are the building blocks of the modern web economy. On any given day the average consumer might interact with dozens of them, from the weather app on their phone to the GPS in their car to their preferred social media platform or e-commerce store. By facilitating interoperability on a massive scale, they've enabled the contemporary digital world as we know it to...
The future of ChatGPT
Wednesday, March 15, 2023 by Brittany Hainzinger
ChatGPT has made waves recently garnering over 100 million users but where is the technology headed over the next year? Award-winning global tech leader Kamales Lardi shares insights on the future of AI and ChatGPT.
"It's expected that advances in machine learning and natural language processing will keep enhancing the capabilities of language models like Ch...
Online gaming connectivity solution from Edgegap
Thursday, February 9, 2023 by Richard Harris
Mathieu Duperre explains what Edge computing is, how Edgegap is helping game developers solve connectivity issues, and reduce latency and lag, plus what the limitations are for large publishers that use traditional infrastructures. Even more, he goes into depth about the findings from the 2022 Online Gaming Connectivity Report which had responses from over 2000 gamers i...
Data privacy training kit from CybeReady
Monday, February 6, 2023 by Freeman Lightner
CybeReady published the company’s Data Privacy CISO Toolkit as Data Privacy Week is set to arrive in January. Access to the Data Privacy CISO Toolkit is free of charge and offered to support data privacy training this month.
Data Privacy Week was inaugurated by the National Cybersecurity Alliance (NCA) because of the importance of privacy data. The occasion beg...
Over 40 percent of DeFi token pairs may be fraudulent
Tuesday, December 27, 2022 by Richard Harris
Rome Blockchain Labs (RBL) has released new research showing that many token pairs on decentralized exchanges (DEXs) may be fraudulent or duplicates. Using its data service, RBL Net, the team analyzed data on over 1,000,000 pairs on Uniswap (ETH) and PancakeSwap (BNB).
In light of the many marketplace crashes and burgeoning fear in the marketplace, due to scandals li...
IP blocking warning when preventing click fraud
Friday, July 29, 2022 by Freeman Lightner
Click fraud is a massive problem, stealing tens of billions of dollars from advertisers every year. The fraudsters responsible for this crime include technically savvy website owners, transnational organized crime gangs, and even Nasdaq-listed multinationals.
The scam works like this: criminals create websites, and contact advertising networks like Microsoft Ads to r...
3D geolocation capabilities for Widow Games apps
Thursday, April 28, 2022 by Richard Harris
NextNav has partnered with Widow Games, a gaming development company closing the gap between the physical and the digital worlds. Through the partnership, Widow Games will bring NextNav's 3D geolocation capabilities to their applications, enabling more immersive virtual experiences tied to the real environments of users, and leveraging location verification to valid...
Kubernetes clusters for AI ML apps
Tuesday, March 29, 2022 by Brittany Hainzinger
Quickly launch and easily manage production-grade Kubernetes clusters for AI and machine learning applications at scale with Rafay.
Rafay Systems, the platform provider for Kubernetes Operations, announced the expansion of the industry's only turnkey solution for operating Kubernetes clusters with GPU support at scale by adding powerful new metrics and dashboards...
Intelligent IoT Network lands from Aeris
Tuesday, February 15, 2022 by Richard Harris
Aeris, the Internet of Things (IoT) solutions provider has announced the next generation of its Intelligent IoT Network, a unique suite of Machine Learning and Artificial Intelligence (AI)-based capabilities that enable superior global IoT connectivity and network performance, increased security performance, and best-in-class IoT network support. The Aeris Intelligent I...
Connecting with people through remote contextual research
Wednesday, January 12, 2022 by Joy Wong Daniels
In product research and design circles, a contextual inquiry is a fancy term for doing research in a user’s natural environment while they go about their typical activities. It’s an essential research methodology product designers and user experience designers rely on, a type of field study that involves in-depth interviews and observations with a small samp...
SRE hiring trends
Thursday, January 6, 2022 by Richard Harris
Ashley Stirrup, COO at Shoreline.io shares his 2022 predictions about the death of the Runbook, the rising cost of outages and SRE hiring trends.
Prediction #1: The death of the Runbook
In the coming year, we will see runbooks fuse out. Our team has been surprised in the last few months with how infrequently people have had true Runbooks. Runbooks are a great plac...
Matthew Halliday predicts 2022
Wednesday, January 5, 2022 by Brittany Hainzinger
Matthew Halliday, Executive Vice President, Product Strategy and Co-Founder at Incorta is a veteran software engineer and data analytics expert, he co-founded Incorta in 2013 after more than 15 years at Oracle and several years managing products at Microsoft. With over 20 years of experience developing products and taking them to market, Matthew has served in several ke...
Mitigating API attacks in 2022
Wednesday, January 5, 2022 by Richard Harris
Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...
Low code platform Zenity lands $5M in funding
Wednesday, December 8, 2021 by Christian Hargrave
Zenity exited stealth mode with a $5 million seed funding round, led by Vertex Ventures and UpWest, and backed by top executives such as the former CISO of Google, Gerhard Eschelbeck, and former CIO of SuccessFactors, Tom Fisher. With Zenity, businesses can promote citizen development and adopt Low-Code/No-Code platforms while avoiding critical data exfiltration or disr...
SaaS management 2021 survey highlights
Monday, October 18, 2021 by Freeman Lightner
LeanIX SaaS Management Survey 2021 highlights a lack of standardized processes and clearly defined roles in SaaS management today, leading to widespread challenges
SaaS adoption in the enterprise continues to grow at an accelerating pace. Indeed, 70 percent of international IT leaders surveyed in a new study published by LeanIX (https://www.leanix.net/) report strong...
SnykCon 2021 event lineup
Friday, September 24, 2021 by Randall Degges
We're only a few weeks away from SnykCon 2021, Snyk's free annual developer conference that helps you learn how to build applications securely running October 5-7. We have a packed agenda full of expert talks, hands-on workshops, helpful demos, product roadmaps, opportunities to interact with some of the smartest speakers and leaders of developer security i...
Header bidding questions answered by AdColony
Wednesday, August 18, 2021 by Richard Harris
In this exclusive Q&A with ADM, Kelly McIvor from AdColony explains what header bidding is, how it is surging and how to choose a platform you trust, plus the challenges and reality that come with the hybrid model that includes waterfall and header bidding.
Last year around this time when marketing budgets at large were being slashed with out-of-home(OOH) an...
Cyvatar raises 9 million for cybersecurity as a service model
Monday, June 21, 2021 by Brittany Hainzinger
Cyvatar announced that it has raised $9 million as part of its Series A financing to help scale and serve its rapidly growing customer base and continue to drive the adoption of its innovative cybersecurity-as-a-service (CSaaS) model.
Cyvatar raises 9 million for cybersecurity as a service model
Escalating cybersecurity breaches and the need to addr...
Not all security vulnerabilities are created equal
Tuesday, May 25, 2021 by Jack Mannino
Applications are the heart of employee and user productivity. There are billions of applications each with a specific function, value and, unfortunately, they also provide one of the easiest openings for cybercriminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the concept o...
env0 automates Infrastructure as Code to streamline cloud management
Monday, April 19, 2021 by Brittany Hainzinger
env0 highlighted continued adoption of the company's cloud infrastructure automation platform by organizations globally as users leverage env0 to streamline Terraform, Terragrunt, and IaC Git workflows. Ratings by entities using and analyzing the platform's CD pipeline automation, powerful role-based access control and governance of IaC deployments reveal the si...
Six areas of focus for continuous security
Friday, April 16, 2021 by Jack Mannino
Applications are the heart of employee and user productivity. There are billions of applications each with a specific function and value and, unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the conce...
GitHub secrets reveal API keys, usernames, passwords, and more exposed
Tuesday, March 30, 2021 by Richard Harris
Over two million secrets have been detected on public GitHub in 2020 and this number is growing 20% Year-Over-Year, a GitGuardian State of Secrets Sprawl on GitHub Report shows.
This growing volume of sensitive data or secrets, like API keys, private keys, certificates, usernames and passwords end up publicly exposed on GitHub, putting corporate security at...
App tracking transparency and your API calls
Thursday, March 18, 2021 by Richard Harris
Apple’s new App Tracking Transparency feature is billed as a win for consumer data rights, with Apple vying for leadership as a global defender of privacy. But regardless of whether it’s good for you or not, the move has the potential to seriously disrupt apps and APIs that depend on the Identifier for Advertisers or IDFA. What’s more, even if an app d...
Infrastructure as code announced by env0
Monday, March 15, 2021 by Brittany Hainzinger
env0 announced the company’s enterprise-grade Infrastructure as Code (IaC) automation platform featuring self-hosted agents, SAML (Security Assertion Mark-up Language) authentication support and SOC2 Type 2 certification. The enhanced platform delivers production proven remote-run workflow management and a new security framework to empower user deployments and dir...
Sonatype implements Applitools to ensure app quality
Friday, March 12, 2021 by Brittany Hainzinger
Sonatype was in search of a solution to prevent visual bugs across the variety of operating systems and browsers supported by the Nexus platform.
After implementing Applitools, the engineering team can solely focus on delivering value, while Applitools uncovers countless unexpected changes before code ever leaves development.
Moving forward, Sonatype will deploy a...
App design to code system from IndigoDesign expands
Monday, February 1, 2021 by Brittany Hainzinger
Indigo.Design announced the public preview of Indigo.Design App Builder. The new tool, created by software maker Infragistics, expands the Indigo.Design design-to-code system by providing designers and developers a common cloud-based platform to build and iterate UI/UX designs in real time, all while using the design tools they prefer. Once their UI is pixel-perfect, us...
Quantum computing in 2021
Monday, January 11, 2021 by Brittany Hainzinger
Quantum computing is likely to become practical soon, with the capability to break many encryption algorithms. Organizations should plan to upgrade to TLS 1.3 and quantum-safe cryptographic ciphers soon. Big Tech vendors Google and Microsoft will make updates to web browsers, but the server-side is for your organization to review and change. Kick off a Y2 K-li...
How to avoid mobile phone apps from leaking your personal data
Wednesday, November 18, 2020 by Brittany Hainzinger
Most people have dozens of mobile phone apps installed on their phone, tablet, or even their smartwatch. In fact, the average person has about 60 to 90 mobile phone apps on their phone. Out of all those apps, many of them could be leaking your personal data. How can you protect yourself? One of the primary ways is by installing a VPN, but there are other ways, too. Here...
HackNotice announces threat intelligence platform
Friday, September 18, 2020 by Brittany Hainzinger
HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...