threats

threats news search results

Developer news items we found relating to threats

35 results
2021-Coding-Week-recap-from-industry-experts

2021 Coding Week recap from industry experts


Monday, September 20, 2021 by

National Coding Week takes place during September 13 - September 19 and it is a great time to engage everyone into coding in a fun and easy way. According to an article from National Today, "92 percent of executives believe American workers are not as skilled as they need to be." National Coding Week is a perfect opportunity for improving your coding skills to...


Network-visibility-improves-with-Endace-and-Kemp-Technologies

Network visibility improves with Endace and Kemp Technologies


Tuesday, August 24, 2021 by

Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy. Network visibility improves, helping teams reduce incident response times The enhanced network flow metadata generation and intelligent traffic mon...


Faster-customer-integrations-from-HackerOne

Faster customer integrations from HackerOne


Thursday, July 29, 2021 by

Tray.io has announced that HackerOne is using Tray Embedded to develop and deliver powerful customer integrations at scale. With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce the integration maintenance burden. Armed with seamless integrations, HackerOne customers can spend less time context-switching...


Cyvatar-raises-9-million-for-cybersecurity-as-a-service-model

Cyvatar raises 9 million for cybersecurity as a service model


Monday, June 21, 2021 by

Cyvatar announced that it has raised $9 million as part of its Series A financing to help scale and serve its rapidly growing customer base and continue to drive the adoption of its innovative cybersecurity-as-a-service (CSaaS) model. Cyvatar raises 9 million for cybersecurity as a service model Escalating cybersecurity breaches and the need to addr...


Uptodown:-An-alternative-to-Google-Play

Uptodown: An alternative to Google Play


Wednesday, June 2, 2021 by

The Uptodown app market has more than 130 million active users per month, and more than 450 monthly downloads of their more than 4 million APKs available. The company operates worldwide and it is localized to 15 different languages. The Spanish-based company was born in 2020 in Málaga and founded as a University Project in 2002. Recently we intervi...


Improving-security-posture-with-static-application-security-testing-

Improving security posture with static application security testing


Friday, February 12, 2021 by

Amid the worldwide pursuit of digital transformation, the software has seen a meteoric rise, and application security has become paramount. As more companies become software-centric, they publish more applications, increasing the risk vulnerable code will be released. To help reduce this risk, static application security testing (SAST) can help dev teams find and fix we...


Developers-and-digital-transformation-speed

Developers and digital transformation speed


Monday, November 23, 2020 by

We are living in challenging and unexpected times. COVID-19 transformed our professional and personal lives in a matter of days. There is a new standard for where we work, where we can go and how we interact with just about everyone. The rapid shift needed to cope with our new normal has fueled a departure from established initiatives, dramatically increasing the rate a...


5-mistakes-businesses-make-in-application-development

5 mistakes businesses make in application development


Friday, October 23, 2020 by

5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...


CircleCI-rolls-out-a-comprehensive-insights-dashboard

CircleCI rolls out a comprehensive insights dashboard


Thursday, October 1, 2020 by

CircleCI announced the rollout of a comprehensive Insights dashboard. CircleCI’s Insights dashboard, powered by DevOps data derived from nearly 2 million jobs and 100,000 projects per day, helps engineering teams make better, more informed decisions that allow them to efficiently deliver software to their users with confidence. “We help our customers a...


Beta-support-for-Kubernetes-announced-by-Druva-Inc.

Beta support for Kubernetes announced by Druva Inc.


Wednesday, September 23, 2020 by

Druva, Inc. announced beta support for Kubernetes workloads which delivers complete application protection that is accessible by all teams, including the central IT team and DevOps. Offered through Druva Cloud Platform, users can quickly recover, migrate, or clone Kubernetes workloads, alongside existing data center, and cloud workloads from a unified interface. Combini...


HackNotice-announces-threat-intelligence-platform

HackNotice announces threat intelligence platform


Friday, September 18, 2020 by

HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...


GitLab-acquires-Peach-Tech-and-Fuzzit

GitLab acquires Peach Tech and Fuzzit


Friday, June 12, 2020 by

GitLab announced it has acquired Peach Tech and Fuzzit. These acquisitions will add fully-mature testing solutions including protocol fuzzing, API fuzzing, DAST API testing, and coverage-guided fuzz testing. This makes GitLab’s DevSecOps offering the first security solution to offer both coverage-guided and behavioral fuzz testing techniques as well as the fi...


Humio-joins-IBM-Edge-Ecosystem

Humio joins IBM Edge Ecosystem


Tuesday, May 5, 2020 by

Already a member of IBM’s Cloud Pak for Multicloud Management ecosystem, Humio is pleased to announce it is now part of the IBM Edge Application Manager Ecosystem, a platform designed to remove the complexity of the scale and variability of edge deployments, an initiative designed to  help enterprises capture the opportunities of edge computing with a variety...


One-Identity-Safeguard-now-supports-Microsoft-SQL-Server

One Identity Safeguard now supports Microsoft SQL Server


Friday, May 1, 2020 by

One Identity announced that its One Identity Safeguard solution now supports Microsoft SQL Server 2017 and SQL Server 2019 database environments. Microsoft was positioned as a Leader in the 2019 Gartner Magic Quadrant for Operational Database Management Systems*. With One Identity Safeguard, organizations can for the first time securely manage, monitor, record and audit...


Adjust-hires-Ville-Mikkola-as-Head-of-CAAF

Adjust hires Ville Mikkola as Head of CAAF


Monday, March 23, 2020 by

Adjust announced a new senior hire to spearhead its Coalition Against Ad Fraud (CAAF). Ville Mikkola joins as Head of CAAF, the industry-wide alliance founded by Adjust to tackle ad fraud.  Ad fraud stands as one of the biggest threats to marketing success, having claimed an estimated $42 billion of ad dollars in 2019. Founded by Adjust in 2017, CAAF is a coalit...


To-encrypt-or-not-encrypt-legacy-devices-no-longer-a-choice

To encrypt or not encrypt legacy devices no longer a choice


Thursday, March 19, 2020 by

Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...


Red-Hat-OpenShift-now-available-for-IBM-and-LinuxONE

Red Hat OpenShift now available for IBM and LinuxONE


Tuesday, February 18, 2020 by

Red Hat OpenShift Container Platform is generally available for IBM Z® and IBM LinuxONE™. “Containers are the next generation of software-defined compute that enterprises will leverage to accelerate their digital transformation initiatives,” says Gary Chen, Research Director at IDC. “IDC estimates that 71% of organizations are in the proce...


Data-Privacy-Day-2020-is-here

Data Privacy Day 2020 is here


Tuesday, January 28, 2020 by

Data Privacy Day is here, and with the recent implementation of the California Consumer Privacy Act, the timing could not be better to discuss the importance of taking steps to protect sensitive data while also keeping personal data private and secure. Similar to GDPR, CCPA will have a profound impact on data privacy and protection, making this year’s Data Priv...


API-Manager-3-from-WSO2-released

API Manager 3 from WSO2 released


Monday, November 18, 2019 by

APIs are the essential building blocks of digital businesses—assembling data, events and services from within the organization, throughout ecosystems, and across devices. This is driving new demands for organizations to create and monetize APIs and API products; maximize adoption and reuse across internal and external portals and API marketplaces; and ensure API s...


Experience-Center-worldwide-launches-from-Microsoft

Experience Center worldwide launches from Microsoft


Monday, November 18, 2019 by

Microsoft has also reimagined the future of work by creating a blueprint for productivity, efficiency, accessibility, flexibility, and collaboration for organizations in the region. In a world where we can expect more than 40 billion devices generating nearly 80 zettabytes (ZB) of data by 2025, organizations and industries will need to quickly adopt new tec...


Best-buy-discontinuing-mobile-platform-for-smart-home-devices-

Best buy discontinuing mobile platform for smart home devices


Monday, September 9, 2019 by

Best Buy has announced it is discontinuing its mobile app platform for controlling its Insignia brand of smart home devices. Some of the products include its Insignia smart wall plugs, Wi-Fi light switches, smart camera, and its Wi-Fi freezer. Chris Olson, CEO of The Media TrustIn the post GDPR world, operating an app, not to mention a smart home platform, will be co...


GlobalPlatform-brings-trust-to-the-IoT-ecosystem

GlobalPlatform brings trust to the IoT ecosystem


Thursday, August 29, 2019 by

Given the increasing need for the internet of things (IoT) device security and trust, GlobalPlatform, the standard for secure digital services and devices, has appointed a Strategic Director with significant expertise in IoT development and deployment. Chris Steck, Head of Standardization, IoT & Industries at Cisco, a full member of GlobalPlatform, will work...


Zeroday-vulnerability-announced-byMcAfee-at-Defcon

Zeroday vulnerability announced byMcAfee at Defcon


Monday, August 19, 2019 by

At DEFCON, McAfee has announced the discovery of a zero-day vulnerability in a commonly used Delta industrial control system. The vulnerability found in the Delta enteliBUS Manager could allow malicious actors complete control of the operating system, enabling remote manipulation of access control systems, boiler rooms, temperature control for critical systems and mo...


Cloud-computing-security-report-2019-is-out-from-CSA

Cloud computing security report 2019 is out from CSA


Thursday, August 8, 2019 by

The Cloud Security Alliance (CSA) defines standards, certifications, and best practices to help ensure a secure cloud computing environment. The CSA has released "Top Threats to Cloud Computing: The Egregious Eleven", a report which re-examines the risks inherent with cloud security and takes a new approach, examining the problems inherent in configu...


Warnings-for-aircraft-cybersecurity

Warnings for aircraft cybersecurity


Thursday, August 1, 2019 by

The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...


Microsoft-Azure-Sphere-certified-processor-coming-in-2020

Microsoft Azure Sphere certified processor coming in 2020


Friday, June 21, 2019 by

NXP Semiconductors N.V. announced a collaboration with Microsoft to deliver a new Microsoft Azure Sphere certified crossover applications processor, as an extension to their popular i.MX 8 high-performance applications processor series. The collaboration will deliver a secure, ultra-efficient, intelligent embedded processor for edge nodes that seamlessly runs Azure Sphe...


Anomaly-detection-by-Instaclustr-processes-19-billion-events-per-day

Anomaly detection by Instaclustr processes 19 billion events per day


Wednesday, June 19, 2019 by

Instaclustr announced it has successfully created an anomaly detection application capable of processing and vetting real-time events at a uniquely massive scale – 19 billion events per day – by leveraging open source Apache Cassandra and Apache Kafka and Kubernetes container orchestration. Get the source code on github. Anomaly detection is the identific...


The-most-popular-gaming-platform,-and-why-cloud-gaming-sucks

The most popular gaming platform, and why cloud gaming sucks


Friday, March 22, 2019 by

Gamers spend an average of 7 hours, 7 mins each week playing (up 19% from last year), and cloud is the next frontier for video games it seems, with major tech players like Microsoft and Google teasing their cloud gaming launches at GDC 19. But getting gamers on board with these new services will require developers to create interactive games that don’t frustr...


Software-engineer-happiness-matters

Software engineer happiness matters


Tuesday, February 19, 2019 by

In the never-ending quest for greater developer productivity, security and compliance usually seem like monkey wrenches in the machinery. These aspects of development are essential, but they can slow down the flow of work and frustrate developers. Security and compliance dog the whole software development process, from the too-often-forgotten build engineering team, ...


UK-parliamentary-report-says-Facebook-should-be-regulated

UK parliamentary report says Facebook should be regulated


Monday, February 18, 2019 by

Facebook and its executives have been labeled "digital gangsters" in a UK parliamentary report that calls for the company to be regulated, after an 18-month long investigation. The 180-page document says that Facebook willfully broke data privacy and competition laws. A summary of the UK parliamentary report finds Compulsory Code of Ethics for te...


Kong-Brain-and-Kong-Immunity-launches-powered-by-AI-and-ML

Kong Brain and Kong Immunity launches powered by AI and ML


Thursday, January 17, 2019 by

Kong Inc. has launched Kong Brain and Kong Immunity for its Kong Enterprise API platform. Powered by artificial intelligence (AI) and machine learning, the new, advanced features will help automate the entire API and service development lifecycle from pre-production to post-production to provide organizations with an intelligent, end-to-end API solution. By automating p...


Industrial-IoT-platform-gets-updates-from-Pulse-Secure

Industrial IoT platform gets updates from Pulse Secure


Monday, December 17, 2018 by

Pulse Secure, a provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access...


Join-us-for-a-free-mobile-app-security-threats-webinar-on-Tuesday

Join us for a free mobile app security threats webinar on Tuesday


Friday, December 7, 2018 by

In 2016, a record 3 billion Yahoo accounts were hacked, and Uber reported that hackers stole the information of over 57 million accounts. Then in 2017, 412 million user accounts were taken from Friendfinder’s sites, and 147.9 million consumers were affected by the Equifax Breach. In 2018, Under Armor said that that it's My Fitness Pal app was hacked, affecting...


AI-for-cybersecurity-

AI for cybersecurity


Tuesday, November 27, 2018 by

As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...


Container-security-considerations-for-developers

Container security considerations for developers


Monday, October 29, 2018 by

On the path to a secure digital business, secure service containers bring the best of agility and security to development teams – a growing concern for companies from startups to the Fortune 500. By moving the security concern out of the application layer into an encompassing container platform, one provides a very elegant solution to significantly reduced attack ...