6 step QA approach published by Info-Tech Research Group
Wednesday, September 4, 2024 by Richard Harris
As organizations integrate Agile, DevOps, automation, and AI into their development workflows, they encounter unique challenges in maintaining high software quality. To address these issues, Info-Tech Research Group has published a blueprint that provides actionable steps for consistently delivering exceptional software. The research emphasizes the need for IT leaders t...
API Consumption Management report highlights
Wednesday, July 24, 2024 by Richard Harris
Lunar.Dev recently announced the release of its inaugural report, "The 2024 State of API Consumption Management." This report focuses on API consumption management and includes an in-depth analysis of current trends, challenges, and strategies involving over 200 companies in managing third-party APIs.
As companies increasingly use and rely on dive...
SaaS integration challenges explained by Prismatic
Wednesday, July 17, 2024 by Richard Harris
In this Q&A, we delve into the world of SaaS integrations with the CEO and co-founder of Prismatic Michael Zuercher. He shares valuable insights on the challenges companies face when implementing integrations, including security concerns, scaling difficulties, and the impact on core product development. Michael offers guidance on mitigating security risks and evalua...
Veracode acquires Longbow Security
Thursday, April 18, 2024 by Freeman Lightner
Veracode announced the acquisition of Longbow Security, a security risk management platform for cloud-native environments. The acquisition marks the next exciting phase of Veracode, underscoring the company’s commitment to help organizations effectively manage and reduce application risk across the growing attack surface.
The integration of Longbow in...
Tom Brady NFT sale sparks warning to consumers from experts
Wednesday, February 28, 2024 by Freeman Lightner
An expert has warned those considering purchasing an NFT off the back of the Tom Brady $40.7k sale, as NFT marketplaces saw $38 million stolen by scammers last year.
The findings, pulled together by Smart Betting Guide, analyzed a database recording crypto scams and exploits to identify the most vulnerable platforms and blockchains over the last year - with NFT marke...
Red Hat Developer Hub is available now
Wednesday, January 24, 2024 by Richard Harris
Red Hat, Inc., the provider of open-source solutions, announced the general availability of Red Hat Developer Hub, an enterprise-grade internal developer platform (IDP) based on Backstage, an open-source Cloud Native Computing Foundation (CNCF) project. Featuring a self-service portal, standardized software templates, dynamic plug-in management, enterprise role-ba...
Software delivery lifecycle security predictions from OpsMx
Wednesday, December 20, 2023 by Richard Harris
Heading into 2024, enterprises face mounting security concerns related to data breaches, evolving privacy regulations, and their increasing reliance on the cloud and software service providers. As such, they are under increasing pressure to secure the software delivery lifecycle and better understand where the threats are coming from and what their vulnerabilities are. ...
Full stack monitoring platform New Relic appoints new CEO
Tuesday, December 12, 2023 by Freeman Lightner
New Relic, the all-in-one observability platform for every engineer, announced that Ashan Willy has been appointed as their new Chief Executive Officer.
"I have long admired New Relic as a true pioneer in the observability market, and am honored to have the opportunity to lead the company as it embarks on the next phase of its journey. The opportunity ahead of u...
Aragon OSx app launches on Arbitrum
Tuesday, December 12, 2023 by Richard Harris
Aragon has deployed its modular Aragon OSx DAO framework and no-code Aragon App on Arbitrum, opening the door for DAOs to interact with a thriving ecosystem of protocols, applications, and assets. Arbitrum’s rollup technology serves as a gateway to the largest Layer 1 ecosystem - Ethereum - and Aragon’s user-friendly tech stack unlocks the mass adoption of D...
API security risks report exposes Netflix and Wordpress
Monday, November 27, 2023 by Richard Harris
Wallarm, the end-to-end API and app security company, announced the release of its Q3-2023 Wallarm API ThreatStats report. The quarterly report details the surge in threats centered around APIs and uncovers critical vulnerabilities, like injections and API data leaks, that have recently impacted leading firms, including Netflix, VMware, and SAP.
The new report i...
Kubernetes data collection feature released from Sumo Logic
Friday, November 10, 2023 by Freeman Lightner
Sumo Logic, the SaaS log analytics platform, announced the availability of its HELM Chart V4 feature to fully unify data collection as part of its continued commitment to OpenTelemetry (OTel). Organizations can now package, configure, and deploy applications and services on Kubernetes clusters with OpenTelemetry as a default to simplify the collection of metrics, events...
You can now use Google Clouds BigQuery with Velotix
Monday, October 30, 2023 by Richard Harris
Velotix announced an integration with Google Cloud’s BigQuery, a serverless enterprise data warehouse, to provide AI-driven data protection and access management for sensitive data stored in Google Cloud. The Velotix data security platform governs and controls compliant access to data throughout the data access lifecycle to provide maximum data utilization wi...
Will AI take your programming job
Wednesday, October 4, 2023 by Freeman Lightner
Some of you might be wondering, is your coding job under threat from AI? It's a question that a lot of programmers are talking about so we conducted an in-depth analysis on its effects on programming jobs to get a concrete answer. Our results revealed how artificial intelligence is influencing programming jobs, whether it replacing programmers or changing ...
Detect hard coded secrets with new capabilities from Cycode
Thursday, August 10, 2023 by Freeman Lightner
Cycode announced the expansion of its hard-coded secrets detection in cloud-based workplaces, as well as a collaboration with Azure DevOps pipelines to ensure end-to-end supply chain integrity and a new IDE plug-in for seamless integration with VS Code.
Building upon its existing code-to-cloud coverage, Cycode now extends its secrets scanning capabilities to encompas...
SBOM mandate to improve cybersecurity in the US
Friday, March 17, 2023 by Freeman Lightner
The number of cyberattacks waged against government sectors worldwide increased by 95% in the second half of 2022 compared to the same time period in 2021. (1) The global cost of cyberattacks is expected to grow exponentially from $8.44 trillion in 2022 to $23.84 trillion by 2027. (2) To support the nation’s critical infrastructure and Federal Government networks,...
Five technology trends to look for in 2023 according to Jitterbit
Friday, January 13, 2023 by Richard Harris
Sometimes the pace of work can get so fast that it can be hard for business leaders to slow down long enough to really scrutinize the technologies and tools that are shuttling their business along. Yet it's crucial to understand the latest technology trends because those technologies are precisely the engines that have the power to help organizations keep up the pac...
Zero trust policies for software releases could be key
Thursday, December 8, 2022 by Gopinath Rebala
Today’s integrated DevOps methodology offers businesses the promise of accelerating innovation by providing customers and employees with new application capabilities faster. However, this approach can also increase risks associated with cybercrime and the failure to comply with rapidly evolving privacy regulations. As a result, minimizing security risk during the ...
Traceable AI and ArmorCode integration
Wednesday, August 24, 2022 by Brittany Hainzinger
ArmorCode has announced an integration with Traceable AI which will bring its data into the ArmorCode platform and improve Application Security Posture from code to cloud.
To move at the speed of business, modern applications are increasingly powered by APIs to deliver functionality. The challenge is that each new API must be secured and as the number of APIs in...
AI ML and IoT trends in 2022
Thursday, January 6, 2022 by Brittany Hainzinger
Rob Gibbon, Product Manager at Canonical, and Gabriel Aguiar Noury, Robotics Product Manager at Canonical, the publisher of Ubuntu discuss their predictions and AI/ML & IoT trends in 2022.
AI ML and IoT Prediction - Rob Gibbon:
Whilst the AI/ML adoption trend accelerates, shadow IT environments and ungoverned cloud run costs will increasingly become an unaccep...
App security testing platform lands from Oxeye
Monday, January 3, 2022 by Freeman Lightner
Oxeye announced the company’s Cloud-Native Application Security Testing Platform (CNAST). The new platform identifies code vulnerabilities, open-source vulnerabilities, and secrets to highlight the most critical issues in the software development lifecycle, delivering clear guidance for fast and accurate remediation.
App security testing platform CNAST
Accor...
SaaS management 2021 survey highlights
Monday, October 18, 2021 by Freeman Lightner
LeanIX SaaS Management Survey 2021 highlights a lack of standardized processes and clearly defined roles in SaaS management today, leading to widespread challenges
SaaS adoption in the enterprise continues to grow at an accelerating pace. Indeed, 70 percent of international IT leaders surveyed in a new study published by LeanIX (https://www.leanix.net/) report strong...
2021 Coding Week recap from industry experts
Monday, September 20, 2021 by Richard Harris
National Coding Week takes place during September 13 - September 19 and it is a great time to engage everyone into coding in a fun and easy way. According to an article from National Today, "92 percent of executives believe American workers are not as skilled as they need to be." National Coding Week is a perfect opportunity for improving your coding skills to...
Improving security posture with static application security testing
Friday, February 12, 2021 by Tim Jarrett
Amid the worldwide pursuit of digital transformation, the software has seen a meteoric rise, and application security has become paramount. As more companies become software-centric, they publish more applications, increasing the risk vulnerable code will be released. To help reduce this risk, static application security testing (SAST) can help dev teams find and fix we...
5 mistakes businesses make in application development
Friday, October 23, 2020 by Mayur S Shah
5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development
Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...
HackNotice announces threat intelligence platform
Friday, September 18, 2020 by Brittany Hainzinger
HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...
GitLab acquires Peach Tech and Fuzzit
Friday, June 12, 2020 by Brittany Hainzinger
GitLab announced it has acquired Peach Tech and Fuzzit. These acquisitions will add fully-mature testing solutions including protocol fuzzing, API fuzzing, DAST API testing, and coverage-guided fuzz testing. This makes GitLab’s DevSecOps offering the first security solution to offer both coverage-guided and behavioral fuzz testing techniques as well as the fi...
To encrypt or not encrypt legacy devices no longer a choice
Thursday, March 19, 2020 by Freeman Lightner
Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...
Iowa caucus app woes from a developer perspective
Friday, February 21, 2020 by Richard Harris
Whether the issues behind the Iowa Democratic Caucus app debacle were specific to UX, connectivity, traffic, or just good ol’ fashioned reluctance to embrace the technology, the ramifications of this mess will be felt for a long time – the hanging chad of the new decade. So are apps out? Absolutely not, but things are going to have to change.
Applications...
FTC cracks down on comprehensive data security for Utah company
Thursday, November 14, 2019 by Richard Harris
A Utah-based technology company has agreed to implement a comprehensive data security program to settle Federal Trade Commission allegations that the company failed to put in place reasonable security safeguards, which allowed a hacker to access the personal information of a million consumers.
InfoTrax Systems, L.C., provides back-end operation services to multi-leve...
Zeroday vulnerability announced byMcAfee at Defcon
Monday, August 19, 2019 by Richard Harris
At DEFCON, McAfee has announced the discovery of a zero-day vulnerability in a commonly used Delta industrial control system.
The vulnerability found in the Delta enteliBUS Manager could allow malicious actors complete control of the operating system, enabling remote manipulation of access control systems, boiler rooms, temperature control for critical systems and mo...
Prevoty offers new Autonomous Application Protection capabilities
Friday, March 1, 2019 by Austin Harris
Imperva announced the expansion of its application security offerings with two new Autonomous Application Protection capabilities.
The update extends customers’ visibility into how applications behave and how users interact with sensitive information. With this expanded view across their business assets, customers will have deeper insights to understand and mit...
IAST supports AppSec efficiencies while cutting costs and headaches
Monday, November 26, 2018 by Asma Zubair
It’s easy to feel passionate about interactive application security testing (IAST) in the world of application security. You see, IAST makes security testing almost invisible. It’s not something that requires a highly trained team to be brought in to carry out and analyze testing results. It doesn’t hold up other teams or processes from moving forward....
Migrating old Windows 2008 apps over to Docker just got easier
Tuesday, November 13, 2018 by Richard Harris
Docker has announced the Windows Server Application Migration Program that lets customers quickly and easily migrate and modernize legacy Windows applications, while driving continuous innovation across any application.
With a large percentage of Windows Server applications still running on Windows Server 2003 or 2008, companies that postpone migrating leg...
DuckDuckGo vs. Google vs. Privacy
Friday, October 19, 2018 by Richard Harris
Online privacy is becoming harder to find - Facebook gathers users’ data to sell to third parties, Google tracks everyone’s searches, ISPs in many countries gather communication data, and governments are increasingly demanding backdoor access to encrypted devices. In the latest news, Google exposed the data of 500,000 Google+ users and didn’t...
Enterprise security report says mobile workers put data at risk
Wednesday, October 10, 2018 by Austin Harris
According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...