Private Repository Secures the AI-driven Development Boom
Friday, March 27, 2026 by Austin Harris
ActiveState has launched ActiveState Curated Catalog. This new offering provides organizations with a private, secure repository of open source components from the ActiveState Library, giving developers and AI code generators access to vetted packages from a trusted internal source instead of pulling them directly from the open internet.
Directly pulling open source ...
Box CEO Aaron Levie states AI is changing SaaS landscape
Tuesday, November 11, 2025 by Russ Scritchfield
Enterprise software is undergoing a structural transformation as artificial intelligence becomes a foundational part of how platforms operate and deliver value. Box CEO Aaron Levie described how AI’s growing role in enterprise workflows is redefining how organizations manage data, automation, and decision-making.
Levie explained that unstructured data - such as...
Llama approved for federal use as Meta expands AI reach
Wednesday, October 8, 2025 by Austin Harris
U.S. government agencies have been cleared to use Meta Platforms’ artificial intelligence system, Llama, signaling a broader adoption of commercial AI tools across federal operations. The General Services Administration (GSA) added Llama to its list of approved AI systems, ensuring that the technology meets federal security and legal standards.
Agencies can tes...
TikTok deal reportedly struck as noted in a Truth Social post
Monday, September 22, 2025 by Trey Abbe
Recent discussions between U.S. and Chinese representatives indicate progress toward resolving ownership concerns surrounding TikTok. The negotiations involve determining corporate control and governance structures that satisfy regulatory expectations while allowing the platform to operate effectively. This framework is intended to ensure that TikTok’s managemen...
McDonalds AI Hiring Bot Breach
Thursday, July 17, 2025 by Russ Scritchfield
Security researchers uncovered a critical vulnerability in McDonald’s AI-powered hiring system, McHire, revealing how a simple password flaw could have exposed applicant data, but importantly, no candidate information was leaked or made publicly available, and only five records were briefly accessed by researchers who responsibly reported the issue.
In a supers...
Cybersecurity in 2025
Tuesday, February 4, 2025 by Richard Harris
Timothy Hollebeek shares his insights on the key cybersecurity trends shaping 2025, focusing on the evolving landscape of digital trust and identity. As quantum computing and AI continue to advance, they bring both groundbreaking innovations and new cybersecurity risks. The introduction of Google’s Willow chip signals a new era of quantum technology, accelerating ...
Telerik and Kendo UI R3 updates from Progress
Tuesday, November 7, 2023 by Richard Harris
Progress the provider of application development and infrastructure software, recently announced the R3 2023 release of Progress Telerik and Progress Kendo UI, the
most powerful .NET and JavaScript UI libraries and tools for application development. From modernizing legacy projects to building new applications, this new release equips developers with the tool...
App security training enhancements by Security Journey
Wednesday, July 19, 2023 by Austin Harris
Security Journey announced an acceleration of its secure coding training platform enhancements. Since combining HackEDU and Security Journey training offerings into one Platform, the company has added or refreshed almost 200 lessons and 25 languages, frameworks, and technologies; giving customers even more new training content to improve secure coding knowledge gain of ...
PCI DSS JavaScript compliance tool free from Jscrambler
Thursday, June 29, 2023 by Brittany Hainzinger
Jscrambler announced the launch and immediate availability of its free PCI DSS JavaScript Compliance Tool to ensure granular and flexible capacity to meet the stringent new requirements introduced by version 4.0 of the Payment Card Industry Data Security Standards (PCI DSS v4.0). This free assessment tool provides organizations of all sizes with clarity and si...
ImmuniWeb Neuron web security scanning
Friday, June 10, 2022 by Richard Harris
ImmuniWeb has announced the launch of ImmuniWeb Neuron, a web application and API web security scanning solution that is based on the award-winning ImmuniWeb AI Platform available.
ImmuniWeb Neuron is designed to rapidly scan tens, hundreds, or even thousands of web applications and APIs for vulnerabilities, weaknesses, and misconfigurations. It c...
Compliance as code adoption in 2022
Monday, January 10, 2022 by Austin Harris
Prashanth Nanjundappa is VP of Product Management at Progress. He has spent his entire career of over 20 years in the tech world, managing cross-functional high-performance teams, focused on building and launching enterprise and consumer products globally.
In the first 12 years of his career, Prashanth worked as a developer, technical lead, and architect for mobile, ...
Quit hiding the cloud from your developers
Wednesday, November 17, 2021 by Tony Perez
If you say a person or organization “goes to great lengths” to achieve something, it means they try very hard and perhaps do extreme things to accomplish their goal. One example of “going to great lengths” that I’ve seen with traditional companies is how they go to great lengths to “hide” the cloud from their pool of potential t...
Crypto APIs launch MPC Wallet as a Service
Wednesday, November 17, 2021 by Brittany Hainzinger
The Bulgarian-based Software-as-a-Service startup Crypto APIs has launched an improved Wallet as a Service (WaaS) to provide small and medium businesses, enterprises, and institutions with a more secure and reliable multi-currency digital wallet.
Crypto APIs launch MPC Wallet as a Service
The service utilizes an advanced Multi-Party Computation (MPC) cryptographic...
Vanta launches Automated ISO 27001 Certification and HIPAA Compliance
Tuesday, July 13, 2021 by Brittany Hainzinger
Vanta announced public availability for two new certification standards that help secure the internet and protect consumer data. Vanta provides automated compliance audits and continuous security monitoring through a robust SaaS platform, enabling companies to achieve industry standardization in weeks instead of months.
The rise of data leaks and privacy concerns hav...
Zero trust framework no longer optional 2021 predictions
Tuesday, January 12, 2021 by Brittany Hainzinger
There’s no doubt that COVID-19 and the shift to remote work have accelerated Zero Trust adoption in the enterprise. In 2021 and the following years, implementing a Zero Trust approach will become essential to protecting every enterprise, regardless of industry. This is due to the increasing volume of cyberthreats that organizations and individuals face on a regula...
GDPR and data security
Friday, September 18, 2020 by Jonathan Weicher
How has the General Data Protection Regulation (GDPR) affected your firm during the past two years? It has been nearly that long since GDPR went into effect across Europe, applicable for any organizations handling the personal information of European citizens. Since that time, it appears to be performing well up to expectations. Firms of all kinds find themse...
PumaPay's latest advancements
Thursday, August 13, 2020 by Brittany Hainzinger
With their new hybrid solution, PumaPay differentiates itself from other payment service providers. Combining crypto with traditional finance, their service now enables payments to be made and received in any currency, with the PMA token acting as a means of value transfer, by virtually anyone from merchants of all varieties to end-users. With measures in place to ensur...
Ekata releases global identity verification dataset
Tuesday, June 16, 2020 by Brittany Hainzinger
Ekata announced the release of the latest innovation to its global identity verification dataset, Network Score. Network Score is a machine learning prediction that enables businesses to better identify good and bad customers based on a series of insights. The new dataset flags potentially risky digital transactions and fraudulent customers by analyzing the activity pat...
Kubernetes platform from Red Hat gets updated
Tuesday, October 22, 2019 by Austin Harris
Red Hat Inc., has announced Red Hat OpenShift 4.2, the latest version of Red Hat's trusted enterprise Kubernetes platform designed to deliver a more powerful developer experience. Red Hat OpenShift 4.2 extends Red Hat's commitment to simplifying and automating enterprise-grade services across the hybrid cloud while empowering developers to innovate and...
First multiTEE security platform for mobile app developers emerges
Tuesday, March 5, 2019 by Austin Harris
Trustonic says it will expand support to include Huawei’s Trusted Execution Environment (TEE) on its mobile application security platform, Trustonic Application Protection (TAP). Until now, TAP has enabled app developers to build apps secured by both strong application shielding for iOS and Android, and hardware-based protection for the 1.7 billion Android devices...
The new Sprint CTL Chromebook NL7 LTE
Wednesday, November 21, 2018 by Austin Harris
Sprint is working with Google and CTL to create the all-new CTL Chromebook NL7 LTE with Sprint featuring Sprint’s built-in LTE technology. The CTL Chromebook NL7 LTE with Sprint seamlessly integrates with Google’s G Suite for Education as well as G-Suite Basic, Business and Enterprise editions, and allows users to connect virtually anywhere without the need ...
The differences between web apps and native apps
Thursday, October 18, 2018 by Richard Harris
Even in 2018, years past the origional question, the debate rages on across the land, in office spaces and conference rooms every day - should we build a full-blown native mobile app, or is distributing over the web good enough?
By now everyone knows the “mobile-first” mentality because statistics like 50% of web searches being done from a mobile dev...
Xpress solution aims to help you create IoT apps faster
Friday, September 21, 2018 by Austin Harris
Silicon Labs now offers a new Wireless Xpress solution to help developers get IoT applications connected and running in a day, with no software development necessary. Silicon Labs’ Wireless Xpress provides a configuration-based development experience with everything developers need including certified Bluetooth 5 Low Energy (LE) and Wi-Fi modules, integrated proto...
IoT security standards to come with Sprint Curiosity IoT
Tuesday, September 18, 2018 by Richard Harris
Sprint has unveiled the Curiosity IoT platform, a new standard in how IoT is managed and secured. Enterprises will now be able to manage IoT devices and connectivity over the air across multiple SIM profiles. Intelligence from device data will be generated instantly through the dedicated, distributed and virtualized core, built together with the new operating system. An...
Point and click app development with Metavine GO
Wednesday, November 8, 2017 by Richard Harris
A recent report by Gartner finds that “more than 80% of top global enterprises have significant business unit development underway, much of it unseen and unsanctioned by IT, but less than 20% have a collaborative citizen development strategy in place.” (Citizen Development is Fundamental to Digital Transformation, Oct 13, 2017, Driver, Wong, Baker). To help solve t...
SaaS adoption is increasing
Tuesday, September 19, 2017 by Richard Harris
Progress has announced findings from its 2017 Data Connectivity Outlook Survey. Progress surveyed 1,200 business and IT professionals in various roles, representing a range of industries across the globe, to capture their views on the impact of the changing landscape of disruptive data sources.Key Findings:- SaaS adoption has increased from 62% to 79% in the last year a...
Appdome integrates into the AppConfig community
Monday, August 14, 2017 by Richard Harris
Appdome, a cloud hub for mobile app integration, has joined the AppConfig Community, re-affirming its ongoing commitment to a secure and efficient mobile industry. AppConfig’s best practice feature-set can now be automatically integrated in apps via the Appdome platform, all without any code or coding. App Publishers (ISVs) and enterprise app developers can add AppConfi...
Why runtime application selfprotection is critical for app security
Tuesday, June 20, 2017 by David Strom
Today most of us go about implementing security from the outside in. The common practice is to start by defining a perimeter and trying to defend it with various security tools. Even though perimeters have been porous for more than a decade, we still can’t give up this notion that if we build a better wall we can keep our enterprises safer.Certainly that is where most e...
Improve mobile app security by turning it into code
Monday, May 8, 2017 by Jeff Williams
Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong. Far more than any one person can be expert in. It's unfair to think that a software developer, who is already supposed to be expert in all the latest software languages, frameworks and best practices, should als...
Easily use blockchain with industrialgrade security systems
Monday, February 13, 2017 by Austin Harris
Accenture has unveiled their new solution that simplifies the ability of blockchain technology to integrate with the industrial-grade security systems that support sectors including financial services, healthcare and government. The solution creates a developer-friendly interface between emerging blockchain platforms and widely used hardware security technology. Accentu...
Enterprise BYOD post holiday woes
Tuesday, January 24, 2017 by Mitch Black
Bring Your Own Device (BYOD) programs are a constant enterprise challenge. For unprepared organizations, the holidays can be especially difficult.Christmas to New Year’s Day is typically a peak time to purchase and/or download apps, so how can your enterprise effectively enroll an influx of new users and devices without compromising program security? While the recent ho...
Creating custom apps doesn't mean you have to reinvent the wheel
Wednesday, January 11, 2017 by David Magnan
New advances in technology come thick and fast, but most companies are unable to keep pace. It can be a struggle just to ensure that existing systems are kept up to date. Few companies are agile enough to leverage the latest tech and drive innovation. The idea that a new, all-encompassing, bespoke application must be developed or cobbled together is pervasive. The truth...
8 cyber security predictions for what's to come in AsiaPacific
Thursday, December 29, 2016 by Austin Harris
Cyber security received heightened interest in 2016 due to a spate of cyber attacks in the region. These included cyber attacks on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), US$81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yah...
Amium Launches With Goals of Unifying File Sharing and Other Team Collaborations
Wednesday, August 3, 2016 by Stuart Parkerson
AeroFS has announced the availability of Amium, a cloud based content-centric collaboration solution built on the AeroFS enterprise file sync and share (EFSS) platform. The platform provides a collaboration experience where teams can engage in group discussions, content creation, and development efforts, all in one place.Amium unifies file sharing, file synchronization,...
SOTI Brings Enterprise Mobility Management to AppConfig Community
Thursday, July 14, 2016 by Richard Harris
SOTI has announced they are joining the AppConfig Community which offers common standards provided by operating system vendors for enterprise app development and deployment. SOTI offers an Enterprise Mobility Management (EMM) solution for a broad range of mobile devices and connected business workflows, including smartphones, tablets, PCs, laptops, digital sig...