security experts

security experts news search results

Developer news items we found relating to security experts

16 results
AI-for-cybersecurity-

AI for cybersecurity


Tuesday, November 27, 2018 by

As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...


Code-security-gamification-company-nabs-$3.5M-in-funding

Code security gamification company nabs $3.5M in funding


Friday, September 14, 2018 by

Secure application development platform provider Secure Code Warrior announced that it has gained US $3.5 million in funding from two strategic venture capital firms. The financing was led by Washington DC-based Paladin Capital Group, with participation from Sydney-based AirTree Ventures. The initial funding round will allow the company to further expand its rapidly gro...


Information-security-event-Black-Hat-USA-celebrates-21-years

Information security event Black Hat USA celebrates 21 years


Tuesday, August 14, 2018 by

Black Hat has highlighted their 2018 event programming and new initiatives that will help make Black Hat USA 2018 its most successful show to date. The event welcomed nearly 19,000 of the most security-savvy professionals across the InfoSec spectrum - spanning academia, world-class researchers, and leaders in the public and private sectors. The event’s robust line...


Rethinking-DevOps-as-DevSecOps

Rethinking DevOps as DevSecOps


Thursday, October 12, 2017 by

If you’re not already thinking right now that your DevOps teams should be run like a DevSecOps team, you may already be in a world of hurt. Time to wake up! As the adoption of APIs continues to grow, so do the risks to organizations that don’t actively test the security of their solutions. Modern Agile development frameworks have changed the way engineering teams produc...


Helping-tackle-the-Iranian-drug-addiction-with-an-app

Helping tackle the Iranian drug addiction with an app


Friday, June 30, 2017 by

United for Iran, a Bay-Area NGO working to promote civil liberties and civil society in Iran, is announcing the release of Haami: a new android app that is designed to provide help for recovering from addiction.Haami, which means “ally,” is a mobile health application that will aid Iranians dealing with addiction by assisting them with dialing back compulsion and offeri...


Improve-mobile-app-security-by-turning-it-into-code

Improve mobile app security by turning it into code


Monday, May 8, 2017 by

Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong. Far more than any one person can be expert in. It's unfair to think that a software developer, who is already supposed to be expert in all the latest software languages, frameworks and best practices, should als...


Ways-you-can-protect-yourself-on-the-Internet

Ways you can protect yourself on the Internet


Thursday, February 23, 2017 by

Editors note: Guest submission by Anas Baig, a Digital Marketer & Security Enthusiast.Anyone can fall victim to hacking, and this fact is as evident as the shining sun. Every time you go online, you are, by default, vulnerable to cyber attacks. Hackers can steal your credit card info, social security number, username and passwords, or even render your PC completely ...


Veris-Group-steps-up-it

Veris Group steps up it's advanced security game with Endgame


Friday, December 16, 2016 by

Endgame has announced that Veris Group's Adaptive Threat Division (ATD), a provider in adversary simulation and detection services, will utilize Endgame's endpoint detection and response platform to enhance detection, response, and threat hunting capabilities to eliminate security threats faster and with greater accuracy for customers.This partnership leverages Endgame'...


What-an-advanced-threat-approach-for-cloud-security-must-address

What an advanced threat approach for cloud security must address


Wednesday, December 14, 2016 by

Headlines about hacking and malware prove that traditional security methods are not up to the task of protecting organizational infrastructures and data from theft and ransomware. As more organizations embrace cloud-first platforms for everything from customer relationship management (CRM) to enterprise resource planning (ERP) platforms and beyond, they place themselves...


How-Governments-Open-Sourcing-Code-Helps-Us-Be-More-Secure

How Governments Open Sourcing Code Helps Us Be More Secure


Friday, August 12, 2016 by

The idea of governments releasing their proprietary code isn’t some pipe dream, it’s slowly becoming a reality in many countries and starting a much needed public discussion in others. Governments around the world are beginning to understand that their software is funded by the public, and therefore belongs to the public and should be accessible for their use. Bulgaria ...


Why-Every-DevOps-Practice-Needs-NextGeneration-Data-Security

Why Every DevOps Practice Needs NextGeneration Data Security


Monday, June 27, 2016 by

As engineers and managers, we live in a world of tradeoffs. A fast solution is usually a sloppy one; a cheap solution is often a fragile one. Any solution that breaks these tradeoffs is extraordinary. A major one can bring about a revolution. The DevOps transformation is just such a revolution. It offers orders-of-magnitude acceleration in software delivery, while ...


Five-Common-Mobile-App-Security-Vulnerabilities--And-How-to-Fix-Them

Five Common Mobile App Security Vulnerabilities And How to Fix Them


Saturday, April 30, 2016 by

Mobile app security leaves much to be desired. That was the conclusion of a 2016 Hewlett Packard Enterprise (HPE) study which found that a staggering 96 percent of 36,000 mobile apps failed at least one of 10 privacy checks. Three years ago, a similar HPE study found that 97 percent of 2,000 apps reviewed held insecure private information. As mobile app usage conti...


HP-Gives-Top-5-Predictions-for-Changes-Coming-to-DevOps-in-2016

HP Gives Top 5 Predictions for Changes Coming to DevOps in 2016


Tuesday, December 1, 2015 by

It has long been a cliché to say that we’re living in a digital revolution. But it’s also truer with every day that passes. Savvy businesses are using the rapid pace and malleability of software to drive more and more differentiation into the marketplace. They’re using instant feedback from users to improve software continuously. And increasingly, they’re doing thi...


Working-in-the-Cloud-is-a-Team-Sport

Working in the Cloud is a Team Sport


Tuesday, October 27, 2015 by

When you or your organization make the decision to put your application in the cloud, whether you know it or not, you just added new team members.In the spirit of Major League Baseball playoff season, I think an analogy about America’s favorite pastime might work well to illustrate. When a pitcher throws a perfect game, even if they strike out every batter, they didn’t ...


AppSecUSA-Security-Conference-to-Delve-Into-Application-and-Cloud-Security

AppSecUSA Security Conference to Delve Into Application and Cloud Security


Friday, September 11, 2015 by

There is still time to participate in OWASP's 12th Annual AppSecUSA Security Conference designed for developers and security experts focusing on application and cloud security. The conference will be held in San Francisco on September 24-25 and a separate two day training program will be offered September 22-23.Held at the Hyatt Regency San Francisco, more than 40 speak...


BlackBerry-and-Mozilla-Developing-Peach-Security-Tool

BlackBerry and Mozilla Developing Peach Security Tool


Friday, August 2, 2013 by

Security experts at BlackBerry and Mozilla have teamed up to further develop a testing tool aimed at discovering and fixing software vulnerabilities in Web browsers.The security testing tool "Peach" was created by Michael Eddington of Deja vu Security in 2004 and has been under active development for almost 10 years, but it will now have the strength of Blackberry and M...