Connected and intelligent devices such those used in the Internet of Things are putting more data online, which is worrisome for Internet users. Many feel that companies are losing control over how personal data is collected. “The most challenging issue today is that the technology ecosystem is extremely complex and constantly evolving, making it even … continue reading
Data is overwhelming cybersecurity teams worldwide. Too much data is not necessarily a bad thing, but the daily barrage creates challenges stemming from the following questions: where is the data coming from, what does it mean and how can it be applied to keep companies more secure? Many in security operations are grappling with how … continue reading
Microsoft has announced the release of the Windows Desktop Program. The program is designed to give developers insight into how their desktop apps without having to cobble together a bunch of tools. The new program provides detailed information about how apps are performing, and identifies any bugs or issues that may hurt the user experience. … continue reading
BMC has announced new capabilities for its Control-M solution. Control-M is the company’s digital business automation platform. The new platform is designed to enable existing and new customers to build, deploy, and manage their business application workflows faster. “In today’s business environment, speed is the currency of digital business,” said Gur Steif, president, digital business … continue reading
Multi-cloud environments are speeding up organizations app driven digital transformation initiatives, but they come with a price. F5 Networks released its 2018 State of Application Delivery report, which revealed while nine in ten respondents are leveraging multi-cloud environments, they worry about managing operations and security. “A major transformation is underway in 2018 in both IT … continue reading
As companies scramble to put out patches and fixes for the recent Meltdown and Spectre vulnerabilities, Google has come up with a new technique to help developers mitigate the risks. The company has developed Retpoline, a binary modification technique designed to mitigate risks against Spectre’s branch target injection attack. “‘Retpoline’ sequences are a software construct … continue reading
Frankenstein is a monster. IT can harm the people who created it. Ergo, IT is a monster. Taking a software tool from this vendor, hardware from another vendor, using a cloud-based storage and network system, can often lead to problems not foreseen by those who approved that approach. “There’s a new philosophy of how IT … continue reading
Earlier this week it was announced that modern CPUs are suffering from two major vulnerabilities being referred to as Meltdown and Spectre. The vulnerabilities will enable attackers to access sensitive information stored on computers. “Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed … continue reading
Year after year businesses face challenges when it comes to security, and 2017 was no different. Instead of trying to lecture the industry about the importance of application security testing, organizations tried to find new ways to bring security front and center. The problem is that developers don’t have proper security education for today’s world … continue reading
Google is taking user privacy seriously in its expanded enforcement of its Unwanted Software Policy. The policy is designed to protect against unwanted or harmful Android app behaviors. As part of this policy, Google will start flagging apps and websites that collect user data without consent. “Apps handling personal user data (such as user phone … continue reading
In a recent survey conducted by Gartner, the organization found that the highest-ranked strategy for a successful DevOps approach was collaboration with information security. “In the past 12 months at Gartner, how to securely integrate security into DevOps — delivering DevSecOps — has been one of the fastest-growing areas of interest of clients, with more … continue reading
A survey released today by NodeSource, developers of Node.js, and Sqreen, a SaaS security solution, found that while developers are fully aware of security risks associated with operating in the open Internet, they’re lax in implementing tools for threat detection and mitigation. The survey, which looked at responses from nearly 300 Node.js users — CTOs, … continue reading