API Manager 3 from WSO2 released
Monday, November 18, 2019 by Richard Harris
APIs are the essential building blocks of digital businesses—assembling data, events and services from within the organization, throughout ecosystems, and across devices. This is driving new demands for organizations to create and monetize APIs and API products; maximize adoption and reuse across internal and external portals and API marketplaces; and ensure API s...
Experience Center worldwide launches from Microsoft
Monday, November 18, 2019 by Freeman Lightner
Microsoft has also reimagined the future of work by creating a blueprint for productivity, efficiency, accessibility, flexibility, and collaboration for organizations in the region.
In a world where we can expect more than 40 billion devices generating nearly 80 zettabytes (ZB) of data by 2025, organizations and industries will need to quickly adopt new tec...
Best buy discontinuing mobile platform for smart home devices
Monday, September 9, 2019 by Richard Harris
Best Buy has announced it is discontinuing its mobile app platform for controlling its Insignia brand of smart home devices. Some of the products include its Insignia smart wall plugs, Wi-Fi light switches, smart camera, and its Wi-Fi freezer.
Chris Olson, CEO of The Media TrustIn the post GDPR world, operating an app, not to mention a smart home platform, will be co...
GlobalPlatform brings trust to the IoT ecosystem
Thursday, August 29, 2019 by Richard Harris
Given the increasing need for the internet of things (IoT) device security and trust, GlobalPlatform, the standard for secure digital services and devices, has appointed a Strategic Director with significant expertise in IoT development and deployment.
Chris Steck, Head of Standardization, IoT & Industries at Cisco, a full member of GlobalPlatform, will work...
Zeroday vulnerability announced byMcAfee at Defcon
Monday, August 19, 2019 by Richard Harris
At DEFCON, McAfee has announced the discovery of a zero-day vulnerability in a commonly used Delta industrial control system.
The vulnerability found in the Delta enteliBUS Manager could allow malicious actors complete control of the operating system, enabling remote manipulation of access control systems, boiler rooms, temperature control for critical systems and mo...
Cloud computing security report 2019 is out from CSA
Thursday, August 8, 2019 by Richard Harris
The Cloud Security Alliance (CSA) defines standards, certifications, and best practices to help ensure a secure cloud computing environment. The CSA has released "Top Threats to Cloud Computing: The Egregious Eleven", a report which re-examines the risks inherent with cloud security and takes a new approach, examining the problems inherent in configu...
Warnings for aircraft cybersecurity
Thursday, August 1, 2019 by Brittany Harris
The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...
Microsoft Azure Sphere certified processor coming in 2020
Friday, June 21, 2019 by Brittany Harris
NXP Semiconductors N.V. announced a collaboration with Microsoft to deliver a new Microsoft Azure Sphere certified crossover applications processor, as an extension to their popular i.MX 8 high-performance applications processor series. The collaboration will deliver a secure, ultra-efficient, intelligent embedded processor for edge nodes that seamlessly runs Azure Sphe...
Anomaly detection by Instaclustr processes 19 billion events per day
Wednesday, June 19, 2019 by Brittany Harris
Instaclustr announced it has successfully created an anomaly detection application capable of processing and vetting real-time events at a uniquely massive scale – 19 billion events per day – by leveraging open source Apache Cassandra and Apache Kafka and Kubernetes container orchestration. Get the source code on github.
Anomaly detection is the identific...
The most popular gaming platform, and why cloud gaming sucks
Friday, March 22, 2019 by Richard Harris
Gamers spend an average of 7 hours, 7 mins each week playing (up 19% from last year), and cloud is the next frontier for video games it seems, with major tech players like Microsoft and Google teasing their cloud gaming launches at GDC 19. But getting gamers on board with these new services will require developers to create interactive games that don’t frustr...
Software engineer happiness matters
Tuesday, February 19, 2019 by Bart Copeland
In the never-ending quest for greater developer productivity, security and compliance usually seem like monkey wrenches in the machinery. These aspects of development are essential, but they can slow down the flow of work and frustrate developers.
Security and compliance dog the whole software development process, from the too-often-forgotten build engineering team, ...
UK parliamentary report says Facebook should be regulated
Monday, February 18, 2019 by Christian Hargrave
Facebook and its executives have been labeled "digital gangsters" in a UK parliamentary report that calls for the company to be regulated, after an 18-month long investigation. The 180-page document says that Facebook willfully broke data privacy and competition laws.
A summary of the UK parliamentary report finds
Compulsory Code of Ethics for te...
Kong Brain and Kong Immunity launches powered by AI and ML
Thursday, January 17, 2019 by Christian Hargrave
Kong Inc. has launched Kong Brain and Kong Immunity for its Kong Enterprise API platform. Powered by artificial intelligence (AI) and machine learning, the new, advanced features will help automate the entire API and service development lifecycle from pre-production to post-production to provide organizations with an intelligent, end-to-end API solution. By automating p...
Industrial IoT platform gets updates from Pulse Secure
Monday, December 17, 2018 by Richard Harris
Pulse Secure, a provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access...
Join us for a free mobile app security threats webinar on Tuesday
Friday, December 7, 2018 by Richard Harris
In 2016, a record 3 billion Yahoo accounts were hacked, and Uber reported that hackers stole the information of over 57 million accounts. Then in 2017, 412 million user accounts were taken from Friendfinder’s sites, and 147.9 million consumers were affected by the Equifax Breach. In 2018, Under Armor said that that it's My Fitness Pal app was hacked, affecting...
AI for cybersecurity
Tuesday, November 27, 2018 by Richard Harris
As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...
Container security considerations for developers
Monday, October 29, 2018 by Richard Harris
On the path to a secure digital business, secure service containers bring the best of agility and security to development teams – a growing concern for companies from startups to the Fortune 500. By moving the security concern out of the application layer into an encompassing container platform, one provides a very elegant solution to significantly reduced attack ...
Enterprise security report says mobile workers put data at risk
Wednesday, October 10, 2018 by Christian Hargrave
According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...
Presidential Alerts and the future of mobile communication
Thursday, October 4, 2018 by Richard Harris
FEMA has sent their first emergency test message to all of the mobile devices throughout the United States. They reported every American who owns a smartphone - which is about 75% of the population, should have received the test alert. In total the message went out to a total of 225 million devices right around 1:18 PM CST reading "Presiden...
AWS and Salesforce announce new integrations
Tuesday, September 25, 2018 by Richard Harris
AWS and Salesforce just announced at Dreamforce 2018 new integrations that they hope will dramatically simplify how data and events are shared across AWS and Salesforce services.
As part of the next phase of their global strategic alliance, the two companies will work together to deliver integrations and frameworks for connecting the Salesforce Platform with AW...
Code security gamification company nabs $3.5M in funding
Friday, September 14, 2018 by Christian Hargrave
Secure application development platform provider Secure Code Warrior announced that it has gained US $3.5 million in funding from two strategic venture capital firms. The financing was led by Washington DC-based Paladin Capital Group, with participation from Sydney-based AirTree Ventures. The initial funding round will allow the company to further expand its rapidly gro...
VMworld 2018 sees new VMware cloud operations services drop
Thursday, August 30, 2018 by Christian Hargrave
At VMworld 2018, VMWare addressed the challenges of multi-cloud environments head-on, announcing new and enhanced VMware Cloud Services that will enable cloud operations, DevOps, and security and compliance teams to better manage cloud costs, operations, security, and compliance across clouds. The advancements to VMware’s cloud operations platform includ...
iOS 12 subscription based app tips for success
Wednesday, August 29, 2018 by Eran Kinsbruner
Last year, Apple held a secret meeting with a select group of iOS app developers in New York to talk about changing the current app delivery model from one-time purchases to subscription-based. From Apple’s view, these one-time purchases typically are inexpensive ($1-2), yet grant end-users unlimited access to the app and support, which can prove to be costly from...
Data masking report finds GDPR is pressing the need for solutions
Thursday, August 23, 2018 by Christian Hargrave
Dataguise has been recognized in a new report on data masking by Gartner titled, Market Guide for Data Masking. As data growth continues and data analytics becomes a mission-critical operation throughout the enterprise, Dataguise has been supporting the need to protect sensitive information in the wake of new data privacy regulations such as the General Data Protec...
Fortnite for Android is a trailblazing risk for mobile banking
Tuesday, August 14, 2018 by Sam Bakken
CEO Tim Sweeny of Epic Games, the publisher of the wildly popular Fortnite game, is on a mission to “advance the openness of all platforms” - not to mention side-step Google’s 30% take of developer proceeds - by distributing Fortnite for the Android platform via their website rather than the Google Play store. I applaud a maverick challenging the statu...
How the reddit security breach reminds us to be careful
Monday, August 6, 2018 by Christian Hargrave
reddit recently disclosed in their announcements feed of a security breach into their system which the hacker "managed to access some user data, including some current email addresses and a 2007 database backup containing old salted and hashed passwords." Include in the disclosed information was some reddit source code and some log files.
They went on to sa...
Autonomous vehicles and data collection talks coming August 78
Wednesday, August 1, 2018 by Christian Hargrave
Three no-cost discussion sessions will explore the growing importance of data capture, use and safe/reliable storage in vehicles and the autonomous transportation at the Flash Memory Summit August 7-8 at the Santa Clara Convention Center.
During the free sessions; engineers, executives, urban planners, government officials and transportation researchers will explore ...
Avoid mobile cybersecurity threats by checking the source
Thursday, July 5, 2018 by Sam Bakken
Earlier this month IT news organizations around the globe reported that Epic Games’ popular Fortnite game was being counterfeited and malicious actors were, in fact, lacing the imposter apps with malware.
We’re only human, and people unwittingly let their guard down in anticipation of something they're passionate about, or when they think they might b...
Questioning the future of privacy and the safety of personal identity
Thursday, June 28, 2018 by Richard Harris
While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR.
These findings and more are outlin...
SWORD attached smartphone device can detect weapons and explosives
Thursday, June 7, 2018 by Richard Harris
The urgent challenge for security personnel to noninvasively scan people in real time and in public to detect and “see” if they are carrying weapons or explosives without physically searching them could soon be solved with the launch of SWORD by Royal Holdings Technologies Corporation (Royal Holdings).
SWORD attaches to a Google Pixel 2 XL smartphone and ...
Artificial Intelligence in the public and private sectors
Thursday, June 7, 2018 by Richard Harris
You're not the only one nervous about AI -in light of rapid AI growth and adoption, the U.S. Government recently held three Subcommittee Meetings designed to understand the implications posed by the widespread adoption of AI technology in the public and private sectors. So why is the US Government concerned about AI in society, and what role should it be considering...
FTP vulnerabilities and what you can do
Thursday, May 24, 2018 by Richard Harris
File Transfer Protocol or (FTP) for short is old, and when I say old - I mean 1971 old when it was initially published as RFC 114. It defines a way clients can transfer files to a server. Typically gated with a password and either sent clear text, or over SSL/TLS/SFTP, it’s a rock solid way to get files sent to their destination and is widely supported. But in today’s w...
What some experts are saying about GDPR
Friday, May 18, 2018 by Christian Hargrave
The GDPR bill is causing an uproar in the industry as the compliance date comes ever nearer. Yet few can say they actually know much about the bill that will come into place on May 25th.GDPR, or the General Data Protection Regulation, is an expansion upon the EU’s previous Data Protection Act of 1998, extending the boundary of its territorial mandate from whatever juris...
Alternative Google Play app stores to consider
Tuesday, May 15, 2018 by Alex Makarevich
Android is open source, and because of that -app developers can build and deploy an APK file anywhere! There are obvious advantages to deploying into the known Android app stores such as Google Play, and Amazon - mostly in the potential number of impressions and installs your app can receive, because Google play comes as the default app store on most Android devices. Pl...
A Blockchain messaging platform that's unstoppable
Tuesday, April 3, 2018 by Richard Harris
Today’s instant messaging is about to get a violent shove forward by way of encryption, and Blockchain. Almost all messaging platforms rely on client to server communication, where a unique ID is given to a thread, and stored in a centralized database somewhere. But it’s always been volatile to censorship, network blocking, or any other form of controlled policing....