Security is one of the first boxes to tick in the journey to the hybrid cloud, yet it’s still the one giving IT teams the most headaches. The recent 2020 State of Application Services Report, a survey of 2,600 respondents globally across all verticals, backs this up. Respondents listed the top challenges in managing a … continue reading
Following its acquisition of XebiaLabs, CollabNet VersionOne has announced it is forming a new software company. Digital.ai will provide end-to-end intelligent value stream management, software delivery and application security. Digital.ai is backed by TPG Capital, and on “a mission to revolutionize how enterprises create, easure, deliver, secure, and continuously improve digital products that provide value, … continue reading
Stackery today announced the expansion of its serverless security and CI/CD capabilities that enable teams to automate delivery best practices. This includes additional audit capabilities, scoped IAM permissions, and secrets management for automated verification and deployment pipelines. Stackery’s SaaS platform makes it possible for any business designing, developing, and delivering modern applications to enhance productivity … continue reading
The past year witnessed some of the biggest data breaches of all time and the rapid proliferation of APIs have created new challenges in approaching the security landscape as a developer. “The fallout from not integrating security early in the development lifecycle has never been more apparent,” the 2019 State of Software Security report stated. … continue reading
Two years after a major data breach that exposed 339 million guest records and cost Marriott $124 million in GDPR violation fines, the company has suffered another, albeit smaller security breach. The hospitality company announced that in February 2020, the company discovered that a large number of guest information might have been accessed using the … continue reading
Automation Anywhere has launched the Bot Security program . The Bot Security program introduces a flexible, multi-tiered framework to certify that bots built by customers, partners, and publishers of bots on Bot Store are pre-certified and trusted to scale RPA more rapidly and securely. Bot Security includes four levels of protection: malware scan; self-attestation and … continue reading
CData announced a $20 million Series A investment round from Updata Partners that will be used to accelerate the rollout of new data connectivity solutions. The company offers real-time drivers and data connectivity solutions for hundreds of SaaS, NoSQL, and Big Data sources that enable modern and legacy applications to connect with cloud data. Updata … continue reading
Neo4j has released a new business intelligence (BI) connector designed to bring live graph datasets to popular BI technologies such as Tableau, Looker, TIBCO Spotfire, Oracle Analytics Cloud and MicroStrategy. The Neo4j BI Connector also allows users to create the visualizations and dashboards that will help extract the hidden value in data, and service to … continue reading
The latest version of Git is now available. In Git 2.26.0, protocol version 2 – which starts with the client request and provides a way for the client to tell the server which references it’s interested in – is now the default. The new release also includes new config options form a few different files: … continue reading
With the coronavirus outbreak and recent New York State laws that mandate at least 50% of many business’ employees to work from home, professionals from all industries are talking about how it will impact the workplace. But working from home was already a trend that IT pros and developers have been dealing with for a … continue reading
HCL has announced a major update to its automated application security testing and management tool. AppScan 10 is designed to provide faster and more accurate security scans, secure DevOps and help enterprises manage application security problems. “AppScan V10 is another example of HCL Software’s commitment to unlocking new value in a battle-tested product that thousands … continue reading
I’ve previously written about the “Three T’s” of shifting security left: training, tools, and teamwork. In this blog, we’re going to delve down a level and look at some of the tools needed to shift left, what they do, and where in the software lifecycle they belong. The lifecycle question is important to think about … continue reading