Machine learning brings new opportunities in the software security realm by offering new ways to handle data, detect malware and improve solutions. However, the problem with machine learning today is that it can be marketed as a silver bullet to catch all things in the security industry, when in reality the technology still has many … continue reading
Microsoft is continuing to commit resources to artificial intelligence research with the announcement of a new organization. Microsoft Research AI is a research and incubation hub for tackling AI’s most difficult challenges, and reuniting the fields of machine learning, perception and natural language processing. “As AI moves from research to product, we are maintaining our … continue reading
While Docker remains a leader in container technology, Kubernetes is gaining popularity for container orchestration and management. The open-source project is ready to release its 1.7 release this week with new features focused on extensibility, security, and other ways for deploying, scaling, and managing containerized applications. According to Joe Brockmeier in a blog, senior evangelist … continue reading
This year, the Open Web Application Security Project (OWASP) released its Top 10 2017 project for public review. There were two vulnerability updates to this year’s 14th release of OWASP, and although they were added to raise awareness on security risks in applications, one company is calling a movement for removal and replacement of one … continue reading
New York’s plan to ramp up cybersecurity fit in with the overall tone of last night’s Pepcom Digital Experience event, held at the Metropolitan Pavilion in the city, proving that businesses are innovating on all security fronts. Whether it’s a device to protect hackers from getting into your devices, or it’s software to safeguard your … continue reading
New York City may turn into the next cybersecurity hub of the United States, thanks to New York Mayor Bill de Blasio’s 10-year plan to invest in new technological industries, raise wages, train New Yorkers, and overall strengthen the middle class. Today, the mayor announced “New York Works,” a series of 25 initiatives to spur … continue reading
Organizations are finding it increasingly difficult to identify dark endpoints, which not only costs enterprises millions of dollars, but also puts companies at risks for threats and attacks. According to new research from Absolute, an endpoint security company, and the Ponemon Institute, organizations are wasting over $6 million in detection, response, and wasted time. While … continue reading
Amazon Web Services (AWS) is making AWS Greengrass — a software which allows customers to run AWS compute, messaging, data caching, and sync capabilities on connected devices — available to all its customers. According to an AWS statement, AWS Greengrass “eliminates the complexity involved in programming and updating IoT devices by allowing customers to use … continue reading
Pepperdata announced a new product that identifies lines of code and stages of performance issues that are related to CPU, memory, or network and disk I/O. The Pepperdata Code Analyzer for Apache Spark provides Spark application developers with the means to find performance issues and connect them to a specific block of code within their … continue reading
There’s a new ransomware attack that has affected several organizations globally, and although it’s slow-moving, security experts are urging companies to keep their antivirus programs up-to-date, as well as their software. The ransomware — dubbed WannaCry (WanaCrypt0r 2.0/WCry) — has hit Britain’s National Health Service, some of Spain’s big companies, and has spread across Russia, … continue reading
In an effort to better protect their users, Google is giving developers new updates when it comes to publishing web applications. The company is updating the app publishing process, risk assessment systems, and user-facing consent page to detect any abnormalities and protect against spoofing or misleading application identities. In addition, the company’s risk assessment process … continue reading