security risk
security risk news search results
Developer news items we found relating to security risk
35 results
Universities fighting cybercrime with students
Thursday, April 24, 2025 by Richard Harris
Universities, one of the most popular targets for cybercriminals, are employing a new tool in the fight against cybercrime, their own students. Over the past few years, universities and colleges around the U.S. have been increasingly hiring students and training them to become analysts in their security operations centers, known as SOCs. Students work alongside...

AI virtual escape room challenge
Friday, March 7, 2025 by Freeman Lightner
Pangea recently announced the general availability of AI Guard and Prompt Guard to secure AI, defending against threats like prompt injection and sensitive information disclosure. Alongside the company’s existing AI Access Control and AI Visibility products, Pangea now offers the industry’s most comprehensive suite of guardrails to secure AI applications.&nb...

AI coding security discussion with JFrog
Wednesday, February 19, 2025 by Richard Harris
Eyal Dyment, Vice President of Security Products at JFrog, shares his insights in this Q&A on the crucial considerations for developers and businesses when selecting an AI platform. With AI’s transformative role in coding and software development, Eyal addresses key security risks, the growing reliance on AI-powered technologies, and the steps developers can t...

API Security Perspectives 2025 report from Kong Inc
Monday, December 30, 2024 by Richard Harris
Kong Inc. released findings from their API Security Perspectives 2025: AI-Enhanced Threats and API Security Report which highlights today’s API security landscape and how new developments in AI will impact it. Most notably, 25% of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75% of respondents expressing serious concern a...

6 step QA approach published by Info-Tech Research Group
Wednesday, September 4, 2024 by Richard Harris
As organizations integrate Agile, DevOps, automation, and AI into their development workflows, they encounter unique challenges in maintaining high software quality. To address these issues, Info-Tech Research Group has published a blueprint that provides actionable steps for consistently delivering exceptional software. The research emphasizes the need for IT leaders t...

API Consumption Management report highlights
Wednesday, July 24, 2024 by Richard Harris
Lunar.Dev recently announced the release of its inaugural report, "The 2024 State of API Consumption Management." This report focuses on API consumption management and includes an in-depth analysis of current trends, challenges, and strategies involving over 200 companies in managing third-party APIs. As companies increasingly use and rely on dive...

SaaS integration challenges explained by Prismatic
Wednesday, July 17, 2024 by Richard Harris
In this Q&A, we delve into the world of SaaS integrations with the CEO and co-founder of Prismatic Michael Zuercher. He shares valuable insights on the challenges companies face when implementing integrations, including security concerns, scaling difficulties, and the impact on core product development. Michael offers guidance on mitigating security risks and evalua...

Veracode acquires Longbow Security
Thursday, April 18, 2024 by Freeman Lightner
Veracode announced the acquisition of Longbow Security, a security risk management platform for cloud-native environments. The acquisition marks the next exciting phase of Veracode, underscoring the company’s commitment to help organizations effectively manage and reduce application risk across the growing attack surface. The integration of Longbow in...

Tom Brady NFT sale sparks warning to consumers from experts
Wednesday, February 28, 2024 by Freeman Lightner
An expert has warned those considering purchasing an NFT off the back of the Tom Brady $40.7k sale, as NFT marketplaces saw $38 million stolen by scammers last year. The findings, pulled together by Smart Betting Guide, analyzed a database recording crypto scams and exploits to identify the most vulnerable platforms and blockchains over the last year - with NFT marke...

Red Hat Developer Hub is available now
Wednesday, January 24, 2024 by Richard Harris
Red Hat, Inc., the provider of open-source solutions, announced the general availability of Red Hat Developer Hub, an enterprise-grade internal developer platform (IDP) based on Backstage, an open-source Cloud Native Computing Foundation (CNCF) project. Featuring a self-service portal, standardized software templates, dynamic plug-in management, enterprise role-ba...

Software delivery lifecycle security predictions from OpsMx
Wednesday, December 20, 2023 by Richard Harris
Heading into 2024, enterprises face mounting security concerns related to data breaches, evolving privacy regulations, and their increasing reliance on the cloud and software service providers. As such, they are under increasing pressure to secure the software delivery lifecycle and better understand where the threats are coming from and what their vulnerabilities are. ...

Full stack monitoring platform New Relic appoints new CEO
Tuesday, December 12, 2023 by Freeman Lightner
New Relic, the all-in-one observability platform for every engineer, announced that Ashan Willy has been appointed as their new Chief Executive Officer. "I have long admired New Relic as a true pioneer in the observability market, and am honored to have the opportunity to lead the company as it embarks on the next phase of its journey. The opportunity ahead of u...

Aragon OSx app launches on Arbitrum
Tuesday, December 12, 2023 by Richard Harris
Aragon has deployed its modular Aragon OSx DAO framework and no-code Aragon App on Arbitrum, opening the door for DAOs to interact with a thriving ecosystem of protocols, applications, and assets. Arbitrum’s rollup technology serves as a gateway to the largest Layer 1 ecosystem - Ethereum - and Aragon’s user-friendly tech stack unlocks the mass adoption of D...

API security risks report exposes Netflix and Wordpress
Monday, November 27, 2023 by Richard Harris
Wallarm, the end-to-end API and app security company, announced the release of its Q3-2023 Wallarm API ThreatStats report. The quarterly report details the surge in threats centered around APIs and uncovers critical vulnerabilities, like injections and API data leaks, that have recently impacted leading firms, including Netflix, VMware, and SAP. The new report i...

Kubernetes data collection feature released from Sumo Logic
Friday, November 10, 2023 by Freeman Lightner
Sumo Logic, the SaaS log analytics platform, announced the availability of its HELM Chart V4 feature to fully unify data collection as part of its continued commitment to OpenTelemetry (OTel). Organizations can now package, configure, and deploy applications and services on Kubernetes clusters with OpenTelemetry as a default to simplify the collection of metrics, events...

You can now use Google Clouds BigQuery with Velotix
Monday, October 30, 2023 by Richard Harris
Velotix announced an integration with Google Cloud’s BigQuery, a serverless enterprise data warehouse, to provide AI-driven data protection and access management for sensitive data stored in Google Cloud. The Velotix data security platform governs and controls compliant access to data throughout the data access lifecycle to provide maximum data utilization wi...

Will AI take your programming job
Wednesday, October 4, 2023 by Freeman Lightner
Some of you might be wondering, is your coding job under threat from AI? It's a question that a lot of programmers are talking about so we conducted an in-depth analysis on its effects on programming jobs to get a concrete answer. Our results revealed how artificial intelligence is influencing programming jobs, whether it replacing programmers or changing ...

Detect hard coded secrets with new capabilities from Cycode
Thursday, August 10, 2023 by Freeman Lightner
Cycode announced the expansion of its hard-coded secrets detection in cloud-based workplaces, as well as a collaboration with Azure DevOps pipelines to ensure end-to-end supply chain integrity and a new IDE plug-in for seamless integration with VS Code. Building upon its existing code-to-cloud coverage, Cycode now extends its secrets scanning capabilities to encompas...

SBOM mandate to improve cybersecurity in the US
Friday, March 17, 2023 by Freeman Lightner
The number of cyberattacks waged against government sectors worldwide increased by 95% in the second half of 2022 compared to the same time period in 2021. (1) The global cost of cyberattacks is expected to grow exponentially from $8.44 trillion in 2022 to $23.84 trillion by 2027. (2) To support the nation’s critical infrastructure and Federal Government networks,...

Five technology trends to look for in 2023 according to Jitterbit
Friday, January 13, 2023 by Richard Harris
Sometimes the pace of work can get so fast that it can be hard for business leaders to slow down long enough to really scrutinize the technologies and tools that are shuttling their business along. Yet it's crucial to understand the latest technology trends because those technologies are precisely the engines that have the power to help organizations keep up the pac...

Zero trust policies for software releases could be key
Thursday, December 8, 2022 by Gopinath Rebala
Today’s integrated DevOps methodology offers businesses the promise of accelerating innovation by providing customers and employees with new application capabilities faster. However, this approach can also increase risks associated with cybercrime and the failure to comply with rapidly evolving privacy regulations. As a result, minimizing security risk during the ...

Traceable AI and ArmorCode integration
Wednesday, August 24, 2022 by Brittany Hainzinger
ArmorCode has announced an integration with Traceable AI which will bring its data into the ArmorCode platform and improve Application Security Posture from code to cloud. To move at the speed of business, modern applications are increasingly powered by APIs to deliver functionality. The challenge is that each new API must be secured and as the number of APIs in...

AI ML and IoT trends in 2022
Thursday, January 6, 2022 by Brittany Hainzinger
Rob Gibbon, Product Manager at Canonical, and Gabriel Aguiar Noury, Robotics Product Manager at Canonical, the publisher of Ubuntu discuss their predictions and AI/ML & IoT trends in 2022. AI ML and IoT Prediction - Rob Gibbon: Whilst the AI/ML adoption trend accelerates, shadow IT environments and ungoverned cloud run costs will increasingly become an unaccep...

App security testing platform lands from Oxeye
Monday, January 3, 2022 by Freeman Lightner
Oxeye announced the company’s Cloud-Native Application Security Testing Platform (CNAST). The new platform identifies code vulnerabilities, open-source vulnerabilities, and secrets to highlight the most critical issues in the software development lifecycle, delivering clear guidance for fast and accurate remediation. App security testing platform CNAST Accor...

SaaS management 2021 survey highlights
Monday, October 18, 2021 by Freeman Lightner
LeanIX SaaS Management Survey 2021 highlights a lack of standardized processes and clearly defined roles in SaaS management today, leading to widespread challenges SaaS adoption in the enterprise continues to grow at an accelerating pace. Indeed, 70 percent of international IT leaders surveyed in a new study published by LeanIX (https://www.leanix.net/) report strong...

2021 Coding Week recap from industry experts
Monday, September 20, 2021 by Richard Harris
National Coding Week takes place during September 13 - September 19 and it is a great time to engage everyone into coding in a fun and easy way. According to an article from National Today, "92 percent of executives believe American workers are not as skilled as they need to be." National Coding Week is a perfect opportunity for improving your coding skills to...

Improving security posture with static application security testing
Friday, February 12, 2021 by Tim Jarrett
Amid the worldwide pursuit of digital transformation, the software has seen a meteoric rise, and application security has become paramount. As more companies become software-centric, they publish more applications, increasing the risk vulnerable code will be released. To help reduce this risk, static application security testing (SAST) can help dev teams find and fix we...

5 mistakes businesses make in application development
Friday, October 23, 2020 by Mayur S Shah
5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...

HackNotice announces threat intelligence platform
Friday, September 18, 2020 by Brittany Hainzinger
HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...

GitLab acquires Peach Tech and Fuzzit
Friday, June 12, 2020 by Brittany Hainzinger
GitLab announced it has acquired Peach Tech and Fuzzit. These acquisitions will add fully-mature testing solutions including protocol fuzzing, API fuzzing, DAST API testing, and coverage-guided fuzz testing. This makes GitLab’s DevSecOps offering the first security solution to offer both coverage-guided and behavioral fuzz testing techniques as well as the fi...

To encrypt or not encrypt legacy devices no longer a choice
Thursday, March 19, 2020 by Freeman Lightner
Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...

Iowa caucus app woes from a developer perspective
Friday, February 21, 2020 by Richard Harris
Whether the issues behind the Iowa Democratic Caucus app debacle were specific to UX, connectivity, traffic, or just good ol’ fashioned reluctance to embrace the technology, the ramifications of this mess will be felt for a long time – the hanging chad of the new decade. So are apps out? Absolutely not, but things are going to have to change. Applications...

FTC cracks down on comprehensive data security for Utah company
Thursday, November 14, 2019 by Richard Harris
A Utah-based technology company has agreed to implement a comprehensive data security program to settle Federal Trade Commission allegations that the company failed to put in place reasonable security safeguards, which allowed a hacker to access the personal information of a million consumers. InfoTrax Systems, L.C., provides back-end operation services to multi-leve...

Zeroday vulnerability announced byMcAfee at Defcon
Monday, August 19, 2019 by Richard Harris
At DEFCON, McAfee has announced the discovery of a zero-day vulnerability in a commonly used Delta industrial control system. The vulnerability found in the Delta enteliBUS Manager could allow malicious actors complete control of the operating system, enabling remote manipulation of access control systems, boiler rooms, temperature control for critical systems and mo...

Prevoty offers new Autonomous Application Protection capabilities
Friday, March 1, 2019 by Austin Harris
Imperva announced the expansion of its application security offerings with two new Autonomous Application Protection capabilities. The update extends customers’ visibility into how applications behave and how users interact with sensitive information. With this expanded view across their business assets, customers will have deeper insights to understand and mit...
Featured Stories

Stay Updated
Sign up for our newsletter for the headlines delivered to youSuccessFull SignUp
![]() |
