API security risks report exposes Netflix and Wordpress
Monday, November 27, 2023 by Richard Harris
Wallarm, the end-to-end API and app security company, announced the release of its Q3-2023 Wallarm API ThreatStats report. The quarterly report details the surge in threats centered around APIs and uncovers critical vulnerabilities, like injections and API data leaks, that have recently impacted leading firms, including Netflix, VMware, and SAP.
The new report i...
Cloud and cyber asset management trends for 2022
Thursday, January 6, 2022 by Richard Harris
Companies have been racing to mature their technologies and pursue digital transformations in the last few years, as a way to gain or maintain competitive advantage and resilience. This has led to an emerging area of focus: cyber asset management. Organizations are now taking inventory of their IT infrastructure and prioritizing more agile cyber asset management process...
Offshore software developers risks and advantages
Thursday, October 28, 2021 by Vivien F. Peaden
The onset of COVID-19 has hastened CEOs’ prioritization of digital transformation to future-proof their organizations. This paradigm change is driving the IT outsourcing spend to improve operational agility, integrate new technologies, and achieve cost-savings and faster time-to-market.
Risks and advantages of using offshore software developers
The pandemic ...
Continental and AWS team up for automotive software platform
Thursday, April 15, 2021 by Brittany Hainzinger
Continental and Amazon Web Services (AWS) will be working together going forward within the scope of a new development cooperation. The goal of the long-term collaboration with AWS serving as the preferred cloud provider is to develop Continental Automotive Edge (CAEdge) – a modular hardware and software platform that connects the vehicle to the cloud and features...
One Identity Safeguard now supports Microsoft SQL Server
Friday, May 1, 2020 by Brittany Hainzinger
One Identity announced that its One Identity Safeguard solution now supports Microsoft SQL Server 2017 and SQL Server 2019 database environments. Microsoft was positioned as a Leader in the 2019 Gartner Magic Quadrant for Operational Database Management Systems*. With One Identity Safeguard, organizations can for the first time securely manage, monitor, record and audit...
FTC cracks down on comprehensive data security for Utah company
Thursday, November 14, 2019 by Richard Harris
A Utah-based technology company has agreed to implement a comprehensive data security program to settle Federal Trade Commission allegations that the company failed to put in place reasonable security safeguards, which allowed a hacker to access the personal information of a million consumers.
InfoTrax Systems, L.C., provides back-end operation services to multi-leve...
AI company Cartica AI lets Continental in on minority stake
Thursday, September 5, 2019 by Freeman Lightner
Continental has acquired a minority stake in Israeli start-up company Cartica AI. Cartica AI develops software in the field of artificial intelligence (AI). The solutions from Cartica AI are designed to accelerate machine learning in the field of object recognition. In the future, automotive systems for automated and autonomous driving will be able to adapt to and handl...
Bringing the mainframe into agile processes with DevOps for Db2
Friday, August 2, 2019 by Christian Hargrave
BMC announced the BMC AMI DevOps for Db2 solution, which is designed to accelerate the delivery of new and updated applications to the market. The solution easily integrates with the Jenkins Pipeline suite of plugins to provide an automated and efficient way of receiving, evaluating, and implementing Db2 schema changes as part of an application update.
The BMC A...
New IoT WiFi and BLE module operates for years on a single AA battery
Tuesday, February 26, 2019 by Christian Hargrave
Telit announced the availability of its latest module, the WL865E4-P. The low-power Wi-Fi Bluetooth Low Energy (BLE) combination module is based on the Qualcomm QCA4020 system-on-chip (SoC) and is designed for high-bandwidth applications such as health care, video, smart home, and industrial control. Featuring integrated cryptology hardware, the WL865E4-P enables IoT de...
Productive app updates while prioritizing the customer
Monday, February 25, 2019 by Richard Harris
Product innovation is essential for companies that want to have a high-performing app. Top companies that stay ahead of the curve are constantly changing, experimenting and creating new ways for users to engage with products. However, when implementing new app features or experiences, customers need to be at the center of the innovation process.
Companies can use tes...
New startup pairs Android developers to businesses
Friday, November 2, 2018 by Christian Hargrave
The driving force in smartphone technology is the app – everyone loves to use them, and every business wants their own.
But the average mobile app costs up to $25,000 when developed by a reputable company. That puts the full-function app out of reach for many small businesses.
Now, a new website unites vetted Android Developers with those business owners to ...
Mobile advertising leads worldwide growth
Friday, May 25, 2018 by Richard Harris
Key trends in mobile advertising is the focus of a new quarterly report out from PubMatic that highlights mobile app advertising growth, the continued expansion of header bidding adoption across mobile inventory, and the expansion of cross-channel monetization.There has been a significant shift in monetization opportunities for mobile app developers as in-app header bid...
CEO Roundtable participants announced for Telecom Exchange NYC 2018
Wednesday, May 9, 2018 by Christian Hargrave
Jaymie Scotto & Associates (JSA), founder and host of the C-Level networking event series, the Telecom Exchange (TEX), announced its CEO Roundtable participants and topics for its 2018 TEX NYC event, taking place June 19-20 in Hoboken, NJ. The event will feature four CEO Roundtables, providing a major platform for tech, telecom and content thought leaders to deliber...
What the Section 702 bill means to your digital privacy
Wednesday, January 24, 2018 by Christian Hargrave
Recently, President Trump signed the Section 702 bill “to reauthorize foreign intelligence collection.” The NSA warrantless surveillance program is still a sweeping up Americans’ online communications, even though Trump has tweeted:“This is NOT the same FISA law that was so wrongly abused during the election. I will always do the right thing for our country and put the ...
The shifting power dynamics of news on the Web
Monday, December 11, 2017 by Andrew Betts
Over the last several years, control of news on the web has drastically shifted. Social networks and search are increasingly how we find content, and our old loyalties to our favorite publications are giving way to consumption of content from varied and ever changing sources. Large, respectable publishers are still vital to a healthy news industry and indeed a healthy d...
Webscale launches new WAF to thwart attacks on eCommerce sites
Thursday, March 2, 2017 by Richard Harris
Webscale has announced the launch of their Cloud Web Application Firewall (WAF), the first of a new line of a-la-carte solutions designed to address the pain points many businesses face with regards to the security, availability and performance of their critical web applications. While the market is flush with WAF solutions that combat malicious attacks at the edge of a...
The problems with agile development
Thursday, February 16, 2017 by Matt Bridges
In many industries, agile development has become standard practice for creating software applications. The benefits are clear: the methodology produces faster results, and often, superior software. So, what are the drawbacks to agile? For the project manager, the drawback is risk. Project managers live with the reality that software estimation is messy and uncertain, an...
Security Brief Protecting Against the OWASP Mobile Top 10
Thursday, January 7, 2016 by Stuart Parkerson
There are over 1.6 million Android apps in the Google Play store. Over 1.5 million apps are in the Apple App Store. For mobile app hackers, today’s mobile environment has never offered a more fertile landscape to phish for user information or implant mobile malware. And never in history has more information been available to exploit.To understand how mobile application ...
With TrulySecure 2.0 Developers Can Move Beyond Thumbprint Recognition
Wednesday, November 18, 2015 by Stuart Parkerson
Sensory has released TrulySecure 2.0, the next generation of the company’s FIDO Certified multimodal biometric authentication technology. This latest release builds on Sensory’s two decades of implementing platforms which enhance user experience and security for consumer electronics by incorporating state-of-the-art neural networks and machine learning principles in spe...
AppSecUSA Security Conference to Delve Into Application and Cloud Security
Friday, September 11, 2015 by Stuart Parkerson
There is still time to participate in OWASP's 12th Annual AppSecUSA Security Conference designed for developers and security experts focusing on application and cloud security. The conference will be held in San Francisco on September 24-25 and a separate two day training program will be offered September 22-23.Held at the Hyatt Regency San Francisco, more than 40 speak...
Three HIPAA Safeguards You Need in Place When Building An App Today
Wednesday, February 4, 2015 by Jason Wang
If you’re building the next mhealth or wearable technology, you’ve no doubt grappled with the challenge of determining whether you need to be HIPAA compliant or not. HIPAA is the Health Insurance Portability and Accountability Act, the federal law that mandates how patient data is stored, handled and utilized. With changes to the legislation in September ...
The Mobile Developer’s Dilemma: Do It Yourself Storage or Surrender Your Data
Thursday, January 29, 2015 by Brian Taptich
With more than 1,600 new apps debuting daily and almost three million fee-based applications currently available in leading app stores, it’s clear that the mobile app economy has exploded. The staggering success of app-based services such as Uber Technologies and Snapchat are prime examples of the massive opportunity mobile app developers have to build an industry-disru...
Mobile Health, HIPAA And Health Technology Predictions For 2015
Saturday, December 6, 2014 by Richard Harris
TrueVault's CEO and Co-Founder, Jason Wang recently shared his predictions on health technology, mobile health and HIPAA for 2015. Maintaining HIPAA compliance for healthcare applications is frustrating and time consuming for developers. TrueVault is known as the first company to make HIPAA compliance convenient for healthcare apps.Concerns in areas suc...
O Brother, Where Art Thou How New Laws Are Governing the Collection and Use of Geolocation Information Inside Apps
Saturday, September 20, 2014 by Adam Grant
Trying to find out where someone is located is valuable information for businesses and attorneys, but there are new laws winding their way through Congress which directly impact how this information is obtained. In 2000, George Clooney appeared in the Joel and Ethan Coen comedy titled O Brother, Where Art Thou? The Coen brothers’ movie created the story as a modern...
What Developers Need to Know About Apple’s HealthKit and HIPAA Compliance
Wednesday, July 9, 2014 by Jason Wang
Apple gave the world a glimpse at the next wave of digital innovation at their annual WorldWide Developers conference with the launch of HealthKit and companion app Health. Both instantly turn the iPhone into arguably the largest digital health platform in the world. While wearables have captured attention and interest, from the Nike Fuelband to Google Gl...
The Price of FREE Apps for Kids: The App Developers Quandary
Tuesday, February 11, 2014 by Eldad Ben Tora
According to Flurry, a
service which continuously monitors mobile applications, the percentage of "free
apps” rose to 90% in 2013. This indicates that nine out
of ten app developers realized that they were either unable or unwilling to ask
for compensation for the product they laboriously developed up front.
When the clear standard cost for
apps is fre...
What Is The Apps Act of 2013
Monday, October 7, 2013 by Adam Grant
In January 2013, the California
Attorney General issued a report
entitled, Privacy on the Go;
Recommendations for the Mobile
Ecosystem. In the very next month,
the Federal Trade Commission
issued its own report, Mobile
Privacy Disclosures; Building Trust
Finally, Congress is talking about
the country’s concerns over privacy
and is consid...
Monday, February 4, 2013 by Richard Harris
The US FTC has issued a non-binding set of guidelines (here) for mobile privacy. That means they aren't policing them "yet" but based on these recommendations you might want to start being more pro-active with your app privacy policies.Mobile computing is growing so fast that the FTC is afraid US consumers might become the victims of overlooked policies, and u...
Developers remove game from iOS store after piracy
Tuesday, December 4, 2012 by Richard Harris
The game "Battle Dungeon" by Hunted Cow Studios was in the iOS App Store for less than a week when it was removed by the developers citing their servers were overloaded with sign-ups coming from pirated copies – 90% of sign-ups that is!They said the hacked installs were coming from rouge versions somewhere on the web which allowed it to be installed on any iOS device th...