Cockroach Labs has announced that it is switching CockroachDB away from the Apache License version 2 (APL). According to Cockroach Labs, its business model has long relied on the assumption that “companies could build a business around a strong open source core product without a much larger technology platform company coming along and offering the … continue reading
Apple is changing its requirements for applications on its App Store to protect user data. Apps in the kids category, VPNs, health or fitness apps will no longer transmit data to third parties and MDM apps, and other apps can only collect data after requesting permission from the user. Additionally, apps in the kids category … continue reading
In the past several years, the tech industry seems to have tried to put more effort into promoting and increasing diversity. But are those initiatives actually working? In many aspects, it seems that the answer is no; things aren’t actually getting any better. According to a 2018 report from the National Center for Women & … continue reading
It is becoming increasingly obvious that businesses have too much data to handle, according to Zebra Technologies. Gartner recently forecasted that enterprise spending on public cloud services are on the rise, and businesses need new ways to gain actionable insights for their vast troves of data. Zebra Technologies hopes to tackle that demand with the … continue reading
Apple announced its new SwiftUI framework, a UI coding structure that lets developers create UIs with less Swift code using declarative syntax and the new graphical design tools Xcode 11. “SwiftUI is built in Swift for Swift and it’s designed to help you build better apps with way less code,” said Craig Federighi, the senior … continue reading
When Jeff Williams, co-founder and CTO of Contrast Security, created the OWASP Top Ten list, first published in 2003, he was proud of the work done; but now more than a decade later, Williams expresses disappointment in the unchanged list. RELATED CONTENT: For effective DevSecOps, shift left AND extend right “My thought at the time … continue reading
Contrast Software Contrast Assess produces accurate results without dependence on application security experts, using deep security instrumentation to analyze code in real time from within the application. It scales because it instruments application security into each application, delivering vulnerability assessment across an entire application portfolio. Contrast Assess integrates seamlessly into the software lifecycle and into … continue reading
dtSearch is now supporting PDF 2.0 through its document filters. Document filters parse, extract, convert and display data, allowing users to search terabytes of online and offline data, the company explained in a post. The document filters are built into dtSearch enterprise and developer products and also for separate SDK licensing. The APIs cover .NET … continue reading
Jeff Williams, co-founder and CTO, Contrast Security: Contrast is an integration platform for application security. We use an instrumentation-based approach, so we work from inside the running application layer. From there, we support the entire software life cycle with three things. The first thing is, we help identify vulnerabilities. Typically you want them to be … continue reading
DevSecOps has come to be known by many as the shifting left of security, making it a key part of software development while code is being written, as opposed to trying to put security onto the application after it’s completed. This follows the trends of DevOps, which moved operational considerations for applications into development, as … continue reading
In the midst of immense public outcry against rampant personal data collection by companies, Apple showed off a variety of new security features for its upcoming iOS 13 release at the company’s annual Worldwide Developers Conference (WWDC). The conference comes days after Apple launched a new website trying to highlight its App Store’s accomplishments while … continue reading
Many Americans seem resigned to not having control over their data profiles on the Internet. As larger and more sophisticated data breaches are reported in growing numbers, and companies such as Facebook and Google engage in mysterious data activities, technology users are left not knowing who’s got their data, or what they’re going to do … continue reading