Mendix has announced a new AI-assisted development solution for low-code application development. Mendix Assist is based on machine learning analysis from more than 5 million anonymized app flows. According to the company, it provides 90 percent accuracy on next-step suggestion, and quality, performance and maintenance recommendations. Mendix Assist is designed to provide hands-on mentoring for … continue reading
A group of Apple developers are banding together to form the Developers Union. The union is designed to advocate for sustainability in the App Store, according to the developers. This is a community-driven “non-union union” designed to help improve the App Store by focusing on the issues that matter the most to developers. “Today, we … continue reading
QbitLogic is leveraging the power of artificial intelligence to better protect software systems. The company announced the release of CodeAI, a next generational SaaS platform designed to repair security defects before releasing solutions to the public. The company is known for its work with DARPA to build an “unhackable” drone utilizing artificial intelligence. “Bug repairs … continue reading
CAST has announced the CAST Security Dashboard, a new solution designed to allow enterprises to improve their understanding and safety of business-critical software. According to the company, over 90 percent of software outages are caused by architectural design flaws. Despite this, security teams rarely consider software architecture when trying to secure IT systems. Recent CAST … continue reading
The team collaboration tool provider Slack is open sourcing a new tool designed to help developers secure features with high output and low friction. goSDL is a web application tool aimed at providing an entry point for a security development lifecycle (SDL) checklist. “For development teams, process can often be antithetical to speed. Ease of … continue reading
In today’s fast-paced, digital world, cybersecurity attacks occur daily. Businesses are scrambling to protect their assets and consumers fear for the safety of their personal information. Even large enterprises with ample resources and expertise aren’t safe, with LinkedIn, Yahoo, Sony, Target and the IRS all falling victim to malicious hackers. According to recent research, the … continue reading
Security matters now. That is the theme at this year’s RSA Conference taking place in San Francisco this week. “There is an urgency and pressure being felt now more than at any time over the last few years. Whether you are looking at national or local politics or the pressures of your company’s board room … continue reading
The open-source collaborative effort dedicated to advancing blockchain technology has announced that a new bug bounty program is now open. The program is based off of a private bug bounty the organization has been running for the last six months with HackerOne. HackerOne will continue to lead the public bounty. Currently, the bounty will solely … continue reading
The Software Assurance Forum for Excellence in Code (SAFECode) has announced the release of the Fundamental Practices for Secure Software Development: Essential Elements of a Secure Development Life Cycle Program (Third Edition). The publication is a set of best practices designed to help organizations improve their software assurance programs and encourage adoption of secure development … continue reading
Netflix is launching a public bug bounty program in order to improve the security of their solutions as well as strengthen their relationship with the security community. The program will be available through Bugcrowd. “Netflix’s goal is to deliver joy to our 117+ million members around the world, and it’s the security team’s job to … continue reading
As the volume of security threats rises, so is the efficiency of Security Operational Centers (SOC) used to combat against security breaches. A newly released report from Micro Focus found a 12 percent improvement in SOC maturity, the biggest improvement over the last five years. The report is based on the company’s Security Operations Maturity … continue reading