SaaS report from Onymos reveals what tech leaders are worried about
Monday, September 9, 2024 by Brittany Hainzinger
Onymos, developer of solutions transforming Software-as-a-Service (SaaS) for software and application development, today announced the findings of its SaaS Disruption Report: Security & Data. It reveals that over three-quarters (78%) of technology leaders are concerned about security threats in Software-as-a-Service (SaaS) for application and software development.
...
GenAI cybersecurity assistant lands from IBM
Friday, August 16, 2024 by Freeman Lightner
IBM recently announced the introduction of generative AI capabilities to its managed Threat Detection and Response Services utilized by IBM Consulting analysts to advance and streamline security operations for clients. Built on IBM's watsonx data and AI platform, the new IBM Consulting Cybersecurity Assistant is designed to accelerate and improve the identification,...
AWS introduces Mithra advanced threat intelligence neural network
Thursday, August 15, 2024 by Freeman Lightner
In a recent blog post from AWS, Amazon Chief Information Security Officer CJ Moses detailed the robust threat intelligence capabilities that safeguard AWS customers. Through tools like Mithra and MadPot, AWS collects and analyzes vast data, identifying and neutralizing threats with unparalleled accuracy and speed. AWS's proactive approach to sharing high-fidelity th...
Generative AI in Application Security report from Checkmarx
Monday, August 12, 2024 by Richard Harris
Checkmarx, the in-cloud-native application security provider, has published its Seven Steps to Safely Use Generative AI in Application Security report, which analyzes key concerns, usage patterns, and buying behaviors relating to the use of AI in enterprise application development. The global study exposed the tension between the need to empower both...
AI integration challenges software developers
Wednesday, March 13, 2024 by Richard Harris
The promise and perils of Artificial Intelligence (AI) has been dominating the headlines with everyone from software developers to students working on ways to integrate it into their daily processes. This burgeoning interest in AI is borne out by the fifth annual Reveal 2024 Top Software Development Challenges survey, which found that the biggest software development ch...
API security risks report exposes Netflix and Wordpress
Monday, November 27, 2023 by Richard Harris
Wallarm, the end-to-end API and app security company, announced the release of its Q3-2023 Wallarm API ThreatStats report. The quarterly report details the surge in threats centered around APIs and uncovers critical vulnerabilities, like injections and API data leaks, that have recently impacted leading firms, including Netflix, VMware, and SAP.
The new report i...
Digital twins will aid developers in 2023
Tuesday, January 24, 2023 by Richard Harris
Dr. William Bain is the founder and CEO of ScaleOut Software, which develops software products to provide operational intelligence for live systems using scalable, in-memory computing. Bill earned a Ph.D. in electrical engineering from Rice University. Over a 40-year career focused on parallel computing, he has contributed to advancements at Bell Labs Research, Intel, a...
DevOps predictions for 2022
Wednesday, January 19, 2022 by Richard Harris
Yoav Landman, Co-Founder, and CTO of JFrog created Artifactory after 7 years as a senior consultant with AlphaCSP. He has held several senior technical roles with Attunity, Verve, and Sausage. Yoav holds a Master of Computing degree from RMIT University and a BA in Law (LLB) from Haifa University.
Low-Code/No-Code, Metaverse, and DevOps predictions for 2022
Landma...
Cloud and Edge computing 2022 predictions
Monday, January 17, 2022 by Brittany Hainzinger
Tobi Knaup is the CEO & Co-Founder at D2iQ, an independent Kubernetes company that 30% of the Fortune 50 companies and the U.S. Department of Defense rely on for their most mission-critical apps. Knaup shares his 2022 predictions about the shifting cloud landscape.
The marriage of Cloud and Edge:
While both edge and cloud computing has been the subj...
Low code platform Zenity lands $5M in funding
Wednesday, December 8, 2021 by Austin Harris
Zenity exited stealth mode with a $5 million seed funding round, led by Vertex Ventures and UpWest, and backed by top executives such as the former CISO of Google, Gerhard Eschelbeck, and former CIO of SuccessFactors, Tom Fisher. With Zenity, businesses can promote citizen development and adopt Low-Code/No-Code platforms while avoiding critical data exfiltration or disr...
Network visibility improves with Endace and Kemp Technologies
Tuesday, August 24, 2021 by Brittany Hainzinger
Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy.
Network visibility improves, helping teams reduce incident response times
The enhanced network flow metadata generation and intelligent traffic mon...
Faster customer integrations from HackerOne
Thursday, July 29, 2021 by Freeman Lightner
Tray.io has announced that HackerOne is using Tray Embedded to develop and deliver powerful customer integrations at scale. With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce the integration maintenance burden. Armed with seamless integrations, HackerOne customers can spend less time context-switching...
5 mistakes businesses make in application development
Friday, October 23, 2020 by Mayur S Shah
5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development
Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...
CircleCI rolls out a comprehensive insights dashboard
Thursday, October 1, 2020 by Brittany Hainzinger
CircleCI announced the rollout of a comprehensive Insights dashboard.
CircleCI’s Insights dashboard, powered by DevOps data derived from nearly 2 million jobs and 100,000 projects per day, helps engineering teams make better, more informed decisions that allow them to efficiently deliver software to their users with confidence.
“We help our customers a...
One Identity Safeguard now supports Microsoft SQL Server
Friday, May 1, 2020 by Brittany Hainzinger
One Identity announced that its One Identity Safeguard solution now supports Microsoft SQL Server 2017 and SQL Server 2019 database environments. Microsoft was positioned as a Leader in the 2019 Gartner Magic Quadrant for Operational Database Management Systems*. With One Identity Safeguard, organizations can for the first time securely manage, monitor, record and audit...
Cloud computing security report 2019 is out from CSA
Thursday, August 8, 2019 by Richard Harris
The Cloud Security Alliance (CSA) defines standards, certifications, and best practices to help ensure a secure cloud computing environment. The CSA has released "Top Threats to Cloud Computing: The Egregious Eleven", a report which re-examines the risks inherent with cloud security and takes a new approach, examining the problems inherent in configu...
Anomaly detection by Instaclustr processes 19 billion events per day
Wednesday, June 19, 2019 by Brittany Hainzinger
Instaclustr announced it has successfully created an anomaly detection application capable of processing and vetting real-time events at a uniquely massive scale – 19 billion events per day – by leveraging open source Apache Cassandra and Apache Kafka and Kubernetes container orchestration. Get the source code on github.
Anomaly detection is the identific...
Join us for a free mobile app security threats webinar on Tuesday
Friday, December 7, 2018 by Richard Harris
In 2016, a record 3 billion Yahoo accounts were hacked, and Uber reported that hackers stole the information of over 57 million accounts. Then in 2017, 412 million user accounts were taken from Friendfinder’s sites, and 147.9 million consumers were affected by the Equifax Breach. In 2018, Under Armor said that that it's My Fitness Pal app was hacked, affecting...
Enterprise security report says mobile workers put data at risk
Wednesday, October 10, 2018 by Austin Harris
According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...
Artificial Intelligence in the public and private sectors
Thursday, June 7, 2018 by Richard Harris
You're not the only one nervous about AI -in light of rapid AI growth and adoption, the U.S. Government recently held three Subcommittee Meetings designed to understand the implications posed by the widespread adoption of AI technology in the public and private sectors. So why is the US Government concerned about AI in society, and what role should it be considering...
Alternative Google Play app stores to consider
Tuesday, May 15, 2018 by Alex Makarevich
Android is open source, and because of that -app developers can build and deploy an APK file anywhere! There are obvious advantages to deploying into the known Android app stores such as Google Play, and Amazon - mostly in the potential number of impressions and installs your app can receive, because Google play comes as the default app store on most Android devices. Pl...
This API api security solution to use AI
Thursday, February 1, 2018 by Richard Harris
To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...
Phobio is partnering with Conversable
Monday, January 22, 2018 by Austin Harris
Phobio has announced a partnership and teaming agreement with Conversable. The partnership will provide enterprises with an all new workforce communication experience through Phobio’s mobile application, Rodio.Rodio provides a two-way communication system designed specifically for enterprises to send important updates, promotions, and other strategic messages to remote ...
Red Hat survey identifies where tech investment is happening most
Friday, January 19, 2018 by Richard Harris
A new survey from Red Hat is out, aimed to better understand how technologies are being applied and the impact they are having in the enterprise. Red Hat commissioned research firm Vanson Bourne to survey 300 IT decision makers from organizations in the U.S., Europe and Asia that employ a significant field workforce. The survey examined investment trends, current a...
Buying Aitheon at the North American Bitcoin Conference
Thursday, January 18, 2018 by Richard Harris
AI segment headliner at the North American Bitcoin Conference, Aitheon launches worldwide token presale on their website. The company is building a digital ecosystem to simplify many processes through AI, robotic, and human symbiosis.The architect of this innovative ecosystem, Andrew Archer, has been described as Creator of Disruptive Technologies through Inno...
Overcoming IoT security threats to achieve better ROI
Monday, January 8, 2018 by Richard Harris
With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...
Tips for securing container deployments
Friday, September 1, 2017 by Richard Harris
Container deployments are still susceptible to the regular threats that other types of deployments are - including DDoS and cross-site scripting attacks. In fact, hackers often take advantage of compromised containers to scan sensitive data, download malware, or privilegeunauthorized access to any of your containers, hosts or data centers.Fei Huang is the CEO of NeuVect...
The Netflix hack: A chat about securing your company
Wednesday, May 10, 2017 by Richard Harris
As the digital transformation progresses onwards, the unfortunate side effects are becoming blatantly obvious in the news. It seems like every other day that some new big box company, political party, or individual has their information compromised. But even though only the few biggest companies get the real media attention, hundreds of millions of hacking attempts are ...
Mobile UX is just as important as functionality
Thursday, March 2, 2017 by Richard Harris
Editors note: Guest submission by Daniel AssoulineWhen building new software or apps, many developers make the mistake of prioritizing functionality over user experience. But user experience is just as important - if not even more important than functionality in any software, app or product. Take security software, for example. By focusing on the functionality, it can p...
The IT delivery gap is slowing business
Thursday, February 16, 2017 by Richard Harris
MuleSoft has announced the findings of its 2017 Connectivity Benchmark Report on digital transformation initiatives and the business impact of APIs.Based on a survey of 951 IT decision makers (ITDMs) globally, the report reveals a growing IT delivery gap that is slowing down the majority of the businesses surveyed and directly putting revenue at risk. With a convergence...
Veris Group steps up it's advanced security game with Endgame
Friday, December 16, 2016 by Austin Harris
Endgame has announced that Veris Group's Adaptive Threat Division (ATD), a provider in adversary simulation and detection services, will utilize Endgame's endpoint detection and response platform to enhance detection, response, and threat hunting capabilities to eliminate security threats faster and with greater accuracy for customers.This partnership leverages Endgame'...
Demystifying persistent storage: As containers die, data lives on
Monday, November 21, 2016 by Aubrey Muhlach
According to a recent survey from Portworx, IT managers depend on containers to help improve their agility, reduce their costs and improve system performance. Yet their number two concern with container storage - loss of data.Containers were developed to be stateless, ephemeral, lightweight tools, only megabytes in size to enable quick application launch. However, in de...
Swift Programmers Using Checkmarx Can Now Detect Security and Code Flaws
Wednesday, September 7, 2016 by Richard Harris
Since launching publicly at Apple’s WWDC in 2014, Swift has soared in popularity amongst programmers and has caught the attention of other major technology players in the process. Google is now even considering implementing Swift as a “first class” language for Android. Facebook and Uber are exploring ways to make Swift more central to their operations, while IBM, ...
Creator of LureDeals Talks About Capitalizing on Pokemon Go Traffic
Saturday, August 27, 2016 by Scott Poniewaz
Britt White is a former hog wrestling world champion, but most recently gained notoriety for Lure Deals, which provides marketing opportunities for Pokémon GO. He has been a part of the Austin tech community for a few years now and runs TKM Labs, a digital agency and virtual reality firm focused on tackling industry specific issues utilizing VR and AR across areas like ...
Rackspace Grants Early Access to Its Managed Security for Azure
Sunday, August 14, 2016 by Stuart Parkerson
Rackspace has announced early access to its Rackspace Managed Security for Microsoft Azure allowing those using Microsoft Azure, Amazon Web Services (AWS), Rackspace Dedicated Hosting and Rackspace Managed VMware Cloud to receive additional security protections provided by Rackspace Managed Security to detect and respond to security threats across cloud platforms.The pl...