The growth of container usage has created new challenges for DevOps teams, which is why Black Duck Software announced today that it will be adding container-scanning capabilities to its Hub software. This addition will help DevOps teams map open-source security vulnerabilities for applications. It will also allow them to map Linux distributions and other software … continue reading
Software security is improving, but this past year still saw hacks and security breaches. In 2015, companies were creating new tools or initiatives to make sure data and critical information were protected, but with a fair share of leaks and hacks, the wait for a solution to software security continues. Unlike other approaches to security, … continue reading
Adobe has provided an update on where the company is and what’s to come with Project Comet, its new solution for UX designers and developers. Project Comet is designed as an end-to-end solution for creating and prototyping websites and mobile apps. The company expects to release a public beta of the solution early next year, … continue reading
Atlassian has officially set its IPO at US$21 a share, raising $482 million, the New York Times reported. The price is above the previously reported expected range, which was at about $16.50 to $18.50 per share for $370 million. According to the Times, the IPO price values the company at $4.38 billion. “Today is a … continue reading
The much publicized hacking of Anthem, Sony and Target (the biggest retail hack in U.S. history) has demonstrated that no matter how robust your perimeter security, cyber criminals will gain—or already have gained—access to your network. This is because when protecting against cyber attacks, many companies focus exclusively on endpoint protection and breach prevention. But … continue reading
Software and security have been getting better, but computer software is still at risk of being compromised by physical access. A new class of security devices is on its way to protect data and control critical information, and with only three days to go on Kickstarter, the team behind it hopes they can build a … continue reading
As companies try to take the best security measures, CoreOS, a company that manages and secures containers, tries to help them out. CoreOS yesterday announced Tectonic with Distributed Trusted Computing. Tectonic is a Kubernetes solution for deploying, managing and securing containers. With Distributed Trusted Computing, it validates everything from the distributed application layer, the container, … continue reading
Microsoft researchers say they are making advancements in computer vision, deep learning, and understanding images. The company, along with colleagues from Carnegie Mellon University, has developed a new system that analyzes images and interprets it as a human would. “The ability to answer questions is critical to developing artificial intelligence tools, and this breakthrough could … continue reading
The quintessential open-source network mapper, Nmap, was updated to version 7 yesterday. This version includes mature IPv6 support and expanded capabilities for its scripting engine. The biggest draw for security-wary developers and admins alike, however, may be the top-shelf SSL/TLS scanning. With SSL and TLS vulnerable to so many different attacks discovered over the past … continue reading
Docker continues to release additions to its software and infrastructure. On Nov. 16, the company announced new security enhancements that safeguard and protect Dockerized distributed applications—without impacting the developer’s workflow. Unveiled during the company’s keynote address at DockerCon EU, the security enhancements—built on top of the Docker Content Trust Framework—are around hardware signing of container … continue reading
The Internet of Things is all around us, and every day we’re soaking it in. It is giving the Internet senses for the first time, which will drive us to the future of business technology. Sensors are a huge part of the Internet of Things—and soon a big part of the Internet as a whole. … continue reading