security threats

security threats news search results

Developer news items we found relating to security threats

35 results
AI-integration-challenges-software-developers

AI integration challenges software developers


Wednesday, March 13, 2024 by

The promise and perils of Artificial Intelligence (AI) has been dominating the headlines with everyone from software developers to students working on ways to integrate it into their daily processes. This burgeoning interest in AI is borne out by the fifth annual Reveal 2024 Top Software Development Challenges survey, which found that the biggest software development ch...


API-security-risks-report-exposes-Netflix-and-Wordpress

API security risks report exposes Netflix and Wordpress


Monday, November 27, 2023 by

Wallarm, the end-to-end API and app security company, announced the release of its Q3-2023 Wallarm API ThreatStats report. The quarterly report details the surge in threats centered around APIs and uncovers critical vulnerabilities, like injections and API data leaks, that have recently impacted leading firms, including Netflix, VMware, and SAP. The new report i...


Digital-twins-will-aid-developers-in-2023

Digital twins will aid developers in 2023


Tuesday, January 24, 2023 by

Dr. William Bain is the founder and CEO of ScaleOut Software, which develops software products to provide operational intelligence for live systems using scalable, in-memory computing. Bill earned a Ph.D. in electrical engineering from Rice University. Over a 40-year career focused on parallel computing, he has contributed to advancements at Bell Labs Research, Intel, a...


DevOps-predictions-for-2022

DevOps predictions for 2022


Wednesday, January 19, 2022 by

Yoav Landman, Co-Founder, and CTO of JFrog created Artifactory after 7 years as a senior consultant with AlphaCSP. He has held several senior technical roles with Attunity, Verve, and Sausage. Yoav holds a Master of Computing degree from RMIT University and a BA in Law (LLB) from Haifa University. Low-Code/No-Code, Metaverse, and DevOps predictions for 2022 Landma...


Cloud-and-Edge-computing-2022-predictions

Cloud and Edge computing 2022 predictions


Monday, January 17, 2022 by

Tobi Knaup is the CEO & Co-Founder at D2iQ, an independent Kubernetes company that 30% of the Fortune 50 companies and the U.S. Department of Defense rely on for their most mission-critical apps. Knaup shares his 2022 predictions about the shifting cloud landscape. The marriage of Cloud and Edge:  While both edge and cloud computing has been the subj...


Low-code-platform-Zenity-lands-$5M-in-funding

Low code platform Zenity lands $5M in funding


Wednesday, December 8, 2021 by

Zenity exited stealth mode with a $5 million seed funding round, led by Vertex Ventures and UpWest, and backed by top executives such as the former CISO of Google, Gerhard Eschelbeck, and former CIO of SuccessFactors, Tom Fisher. With Zenity, businesses can promote citizen development and adopt Low-Code/No-Code platforms while avoiding critical data exfiltration or disr...


Network-visibility-improves-with-Endace-and-Kemp-Technologies

Network visibility improves with Endace and Kemp Technologies


Tuesday, August 24, 2021 by

Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy. Network visibility improves, helping teams reduce incident response times The enhanced network flow metadata generation and intelligent traffic mon...


Faster-customer-integrations-from-HackerOne

Faster customer integrations from HackerOne


Thursday, July 29, 2021 by

Tray.io has announced that HackerOne is using Tray Embedded to develop and deliver powerful customer integrations at scale. With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce the integration maintenance burden. Armed with seamless integrations, HackerOne customers can spend less time context-switching...


5-mistakes-businesses-make-in-application-development

5 mistakes businesses make in application development


Friday, October 23, 2020 by

5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...


CircleCI-rolls-out-a-comprehensive-insights-dashboard

CircleCI rolls out a comprehensive insights dashboard


Thursday, October 1, 2020 by

CircleCI announced the rollout of a comprehensive Insights dashboard. CircleCI’s Insights dashboard, powered by DevOps data derived from nearly 2 million jobs and 100,000 projects per day, helps engineering teams make better, more informed decisions that allow them to efficiently deliver software to their users with confidence. “We help our customers a...


One-Identity-Safeguard-now-supports-Microsoft-SQL-Server

One Identity Safeguard now supports Microsoft SQL Server


Friday, May 1, 2020 by

One Identity announced that its One Identity Safeguard solution now supports Microsoft SQL Server 2017 and SQL Server 2019 database environments. Microsoft was positioned as a Leader in the 2019 Gartner Magic Quadrant for Operational Database Management Systems*. With One Identity Safeguard, organizations can for the first time securely manage, monitor, record and audit...


Cloud-computing-security-report-2019-is-out-from-CSA

Cloud computing security report 2019 is out from CSA


Thursday, August 8, 2019 by

The Cloud Security Alliance (CSA) defines standards, certifications, and best practices to help ensure a secure cloud computing environment. The CSA has released "Top Threats to Cloud Computing: The Egregious Eleven", a report which re-examines the risks inherent with cloud security and takes a new approach, examining the problems inherent in configu...


Anomaly-detection-by-Instaclustr-processes-19-billion-events-per-day

Anomaly detection by Instaclustr processes 19 billion events per day


Wednesday, June 19, 2019 by

Instaclustr announced it has successfully created an anomaly detection application capable of processing and vetting real-time events at a uniquely massive scale – 19 billion events per day – by leveraging open source Apache Cassandra and Apache Kafka and Kubernetes container orchestration. Get the source code on github. Anomaly detection is the identific...


Join-us-for-a-free-mobile-app-security-threats-webinar-on-Tuesday

Join us for a free mobile app security threats webinar on Tuesday


Friday, December 7, 2018 by

In 2016, a record 3 billion Yahoo accounts were hacked, and Uber reported that hackers stole the information of over 57 million accounts. Then in 2017, 412 million user accounts were taken from Friendfinder’s sites, and 147.9 million consumers were affected by the Equifax Breach. In 2018, Under Armor said that that it's My Fitness Pal app was hacked, affecting...


Enterprise-security-report-says-mobile-workers-put-data-at-risk

Enterprise security report says mobile workers put data at risk


Wednesday, October 10, 2018 by

According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...


Artificial-Intelligence-in-the-public-and-private-sectors

Artificial Intelligence in the public and private sectors


Thursday, June 7, 2018 by

You're not the only one nervous about AI -in light of rapid AI growth and adoption, the U.S. Government recently held three Subcommittee Meetings designed to understand the implications posed by the widespread adoption of AI technology in the public and private sectors. So why is the US Government concerned about AI in society, and what role should it be considering...


Alternative-Google-Play-app-stores-to-consider

Alternative Google Play app stores to consider


Tuesday, May 15, 2018 by

Android is open source, and because of that -app developers can build and deploy an APK file anywhere! There are obvious advantages to deploying into the known Android app stores such as Google Play, and Amazon - mostly in the potential number of impressions and installs your app can receive, because Google play comes as the default app store on most Android devices. Pl...


This-API-api-security-solution-to-use-AI

This API api security solution to use AI


Thursday, February 1, 2018 by

To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...


Phobio-is-partnering-with-Conversable

Phobio is partnering with Conversable


Monday, January 22, 2018 by

Phobio has announced a partnership and teaming agreement with Conversable. The partnership will provide enterprises with an all new workforce communication experience through Phobio’s mobile application, Rodio.Rodio provides a two-way communication system designed specifically for enterprises to send important updates, promotions, and other strategic messages to remote ...


Red-Hat-survey-identifies-where-tech-investment-is-happening-most

Red Hat survey identifies where tech investment is happening most


Friday, January 19, 2018 by

A new survey from Red Hat is out, aimed to better understand how technologies are being applied and the impact they are having in the enterprise. Red Hat commissioned research firm Vanson Bourne to survey 300 IT decision makers from organizations in the U.S., Europe and Asia that employ a significant field workforce. The survey examined investment trends, current a...


Buying-Aitheon-at-the-North-American-Bitcoin-Conference

Buying Aitheon at the North American Bitcoin Conference


Thursday, January 18, 2018 by

AI segment headliner at the North American Bitcoin Conference, Aitheon launches worldwide token presale on their website. The company is building a digital ecosystem to simplify many processes through AI, robotic, and human symbiosis.The architect of this innovative ecosystem, Andrew Archer, has been described as Creator of Disruptive Technologies through Inno...


Overcoming-IoT-security-threats-to-achieve-better-ROI

Overcoming IoT security threats to achieve better ROI


Monday, January 8, 2018 by

With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...


Tips-for-securing-container-deployments

Tips for securing container deployments


Friday, September 1, 2017 by

Container deployments are still susceptible to the regular threats that other types of deployments are - including DDoS and cross-site scripting attacks. In fact, hackers often take advantage of compromised containers to scan sensitive data, download malware, or privilegeunauthorized access to any of your containers, hosts or data centers.Fei Huang is the CEO of NeuVect...


The-Netflix-hack:-A-chat-about-securing-your-company

The Netflix hack: A chat about securing your company


Wednesday, May 10, 2017 by

As the digital transformation progresses onwards, the unfortunate side effects are becoming blatantly obvious in the news. It seems like every other day that some new big box company, political party, or individual has their information compromised. But even though only the few biggest companies get the real media attention, hundreds of millions of hacking attempts are ...


Mobile-UX-is-just-as-important-as-functionality

Mobile UX is just as important as functionality


Thursday, March 2, 2017 by

Editors note: Guest submission by Daniel AssoulineWhen building new software or apps, many developers make the mistake of prioritizing functionality over user experience. But user experience is just as important - if not even more important than functionality in any software, app or product. Take security software, for example. By focusing on the functionality, it can p...


The-IT-delivery-gap-is-slowing-business

The IT delivery gap is slowing business


Thursday, February 16, 2017 by

MuleSoft has announced the findings of its 2017 Connectivity Benchmark Report on digital transformation initiatives and the business impact of APIs.Based on a survey of 951 IT decision makers (ITDMs) globally, the report reveals a growing IT delivery gap that is slowing down the majority of the businesses surveyed and directly putting revenue at risk. With a convergence...


Veris-Group-steps-up-it

Veris Group steps up it's advanced security game with Endgame


Friday, December 16, 2016 by

Endgame has announced that Veris Group's Adaptive Threat Division (ATD), a provider in adversary simulation and detection services, will utilize Endgame's endpoint detection and response platform to enhance detection, response, and threat hunting capabilities to eliminate security threats faster and with greater accuracy for customers.This partnership leverages Endgame'...


Demystifying-persistent-storage:-As-containers-die,-data-lives-on

Demystifying persistent storage: As containers die, data lives on


Monday, November 21, 2016 by

According to a recent survey from Portworx, IT managers depend on containers to help improve their agility, reduce their costs and improve system performance. Yet their number two concern with container storage - loss of data.Containers were developed to be stateless, ephemeral, lightweight tools, only megabytes in size to enable quick application launch. However, in de...


Swift-Programmers-Using-Checkmarx-Can-Now-Detect-Security-and-Code-Flaws

Swift Programmers Using Checkmarx Can Now Detect Security and Code Flaws


Wednesday, September 7, 2016 by

Since launching publicly at Apple’s WWDC in 2014, Swift has soared in popularity amongst programmers and has caught the attention of other major technology players in the process. Google is now even considering implementing Swift as a “first class” language for Android. Facebook and Uber are exploring ways to make Swift more central to their operations, while IBM, ...


Creator-of-LureDeals-Talks-About-Capitalizing-on-Pokemon-Go-Traffic

Creator of LureDeals Talks About Capitalizing on Pokemon Go Traffic


Saturday, August 27, 2016 by

Britt White is a former hog wrestling world champion, but most recently gained notoriety for Lure Deals, which provides marketing opportunities for Pokémon GO. He has been a part of the Austin tech community for a few years now and runs TKM Labs, a digital agency and virtual reality firm focused on tackling industry specific issues utilizing VR and AR across areas like ...


Rackspace-Grants-Early-Access-to-Its-Managed-Security-for-Azure

Rackspace Grants Early Access to Its Managed Security for Azure


Sunday, August 14, 2016 by

Rackspace has announced early access to its Rackspace Managed Security for Microsoft Azure allowing those using Microsoft Azure, Amazon Web Services (AWS), Rackspace Dedicated Hosting and Rackspace Managed VMware Cloud to receive additional security protections provided by Rackspace Managed Security to detect and respond to security threats across cloud platforms.The pl...


How-Governments-Open-Sourcing-Code-Helps-Us-Be-More-Secure

How Governments Open Sourcing Code Helps Us Be More Secure


Friday, August 12, 2016 by

The idea of governments releasing their proprietary code isn’t some pipe dream, it’s slowly becoming a reality in many countries and starting a much needed public discussion in others. Governments around the world are beginning to understand that their software is funded by the public, and therefore belongs to the public and should be accessible for their use. Bulgaria ...


New-Security-Report-Reveals-Increased-Threat-for-Mobile-Applications-

New Security Report Reveals Increased Threat for Mobile Applications


Sunday, February 21, 2016 by

According to a new cyber security report, mobile applications increasingly have become top security threats plaguing enterprises over the past year. The details are outlined in the recently published Hewlett Packard Enterprise (HPE) Cyber Risk Report 2016.As the company points out in the report, traditional network perimeters are disappearing allowing attack surfaces to...


Guidelines-to-Identify-and-Protect-Against-Internal-Network-Security-Threats

Guidelines to Identify and Protect Against Internal Network Security Threats


Friday, February 19, 2016 by

APCON, a provider of intelligent network monitoring solutions, has published a new guide to identify and protect against internal network security threats. The publication, “Safeguarding Your Network from Insider Threats,” highlights the impact of data breaches and internal threats, which despite receiving less public attention, can be just as dangerous and damaging as ...


Using-Continuous-Intelligence-for-Real-Time-Machine-Data-Analytics

Using Continuous Intelligence for Real Time Machine Data Analytics


Tuesday, February 9, 2016 by

The sophistication of business analytics continues to grow exponentially as companies introduce more robust and advanced analytics solutions. One such company is Sumo Logic, which offers a SaaS-based log analytics platform which analyzes terabytes of data in real-time.We visited with Christian Beedgen, Sumo Logic’s CTO, to learn about his company’s “Continuous Intellige...