Topic: security

SD Times news digest: BMC’s business automation platform, Loom Systems’ AI playbook and Adobe XD CC updates

BMC has announced new capabilities for its Control-M solution. Control-M is the company’s digital business automation platform. The new platform is designed to enable existing and new customers to build, deploy, and manage their business application workflows faster. “In today’s business environment, speed is the currency of digital business,” said Gur Steif, president, digital business … continue reading

F5 Networks: Multi-cloud environments are causing multiple security headaches

Multi-cloud environments are speeding up organizations app driven digital transformation initiatives, but they come with a price. F5 Networks released its 2018 State of Application Delivery report, which revealed while nine in ten respondents are leveraging multi-cloud environments, they worry about managing operations and security. “A major transformation is underway in 2018 in both IT … continue reading

Google creates software protection technique to ward off Spectre bug

As companies scramble to put out patches and fixes for the recent Meltdown and Spectre vulnerabilities, Google has come up with a new technique to help developers mitigate the risks. The company has developed Retpoline, a binary modification technique designed to mitigate risks against Spectre’s branch target injection attack. “‘Retpoline’ sequences are a software construct … continue reading

Industry Watch: Transformation can be a monster

Frankenstein is a monster. IT can harm the people who created it. Ergo, IT is a monster. Taking a software tool from this vendor, hardware from another vendor, using a cloud-based storage and network system, can often lead to problems not foreseen by those who approved that approach. “There’s a new philosophy of how IT … continue reading

Major tech companies scramble to put out fixes for Meltdown and Spectre vulnerabilities

Earlier this week it was announced that modern CPUs are suffering from two major vulnerabilities being referred to as Meltdown and Spectre. The vulnerabilities will enable attackers to access sensitive information stored on computers. “Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed … continue reading

2017: Security was not an afterthought

Year after year businesses face challenges when it comes to security, and 2017 was no different. Instead of trying to lecture the industry about the importance of application security testing, organizations tried to find new ways to bring security front and center. The problem is that developers don’t have proper security education for today’s world … continue reading

Google will not tolerate Android apps that collect personal data without permission

Google is taking user privacy seriously in its expanded enforcement of its Unwanted Software Policy. The policy is designed to protect against unwanted or harmful Android app behaviors. As part of this policy, Google will start flagging apps and websites that collect user data without consent. “Apps handling personal user data (such as user phone … continue reading

Gartner’s guide to successful DevSecOps

In a recent survey conducted by Gartner, the organization found that the highest-ranked strategy for a successful DevOps approach was collaboration with information security. “In the past 12 months at Gartner, how to securely integrate security into DevOps — delivering DevSecOps — has been one of the fastest-growing areas of interest of clients, with more … continue reading

NodeSource survey reveals developers are slacking on security

A survey released today by NodeSource, developers of Node.js, and Sqreen, a SaaS security solution, found that while developers are fully aware of security risks associated with operating in the open Internet, they’re lax in implementing tools for threat detection and mitigation. The survey, which looked at responses from nearly 300 Node.js users — CTOs, … continue reading

Report: Open source software projects are maturing

Electronic design automation company Synopsys released the findings of its 2017 Coverity Scan Report, which shows an increased of “project maturity” in the over 4,600 open source software projects analyzed based on certain secure development strategies. The 20-page report outlines Synopsys’s method of gathering user-submitted projects, encompassing approximately 760 million lines of code, and analyzing … continue reading

How to prepare for the General Data Protection Regulation

Coming into force on May 25, 2018 is the long-awaited European General Data Protection Regulation (GDPR), which will change how businesses handle data on their customers and employees. In this ever-evolving world of data privacy, it’s important for companies to not only gain a strong understanding of GDPR, but understand where their data is located … continue reading

Companies to watch in 2018

The world of software development involves so much more than writing code these days. Developers need to understand artificial intelligence, the cloud, new methodologies, and the expanding infrastructure required for the Internet of Things. Here are some companies our editors are watching to lead the way. tCell WHAT THEY DO: Application security WHY WE’RE WATCHING: … continue reading

DMCA.com Protection Status