Topic: software security

Red Hat OpenShift

Red Hat Summit: Black Duck’s Hub solution, CloudHealth Technologies’ cloud service management platform, and Sonatype’s Nexus Repository

Red Hat’s annual open-source technology event, Red Hat Summit, is coming to a close today. The event showcases the latest innovations in cloud computing, platform, virtualization, middleware, storage and systems management technologies. In addition to the company’s numerous announcements, open-source solution providers and businesses gathered together to release their latest solutions and showcase platform features. … continue reading

The best crash and bug reporters  of 2017

“Quality is never an accident; it is always the result of intelligent effort.”  — John Ruskin As creators of software, we strive to eliminate bugs to create the best experience for our users. But we can only fix problems we know about, and the more we know, the faster it goes.  All third-party mobile bug … continue reading

Core Infrastructure Initiative celebrates three years with new structure and more strategy

It has been three years since the Heartbleed bug plagued the Internet, and the Linux Foundation’s Core Infrastructure Initiative (CII) was formed. As the organization embarks on the next three years, it is making new structure funding decisions, and hoping to do “less fire-fighting” and “more strategizing.” The CII is introducing new membership levels; a … continue reading

Flexera: Ensure Safe, Secure Software Products

Software developers use a lot of third-party software today, much of which is open source.  As software designs continue to become more modular, the use of third-party software is increasing.  As a result, software is becoming more difficult to understand, even by the people who built it, which enables licensing and security risks to creep … continue reading

Weak biometric security systems, Microsoft’s ReactXP, and the Mozilla Open Source Support (MOSS) program — SD Times news digest: April 14, 2017

The fingerprint or biometric security system on your smartphone is not as secure as you think. Researchers from NYU and Michigan State University have discovered a way to fool biometric security systems into giving them access to smartphones. According to the researchers, fingerprint-based authentication systems use small sensors that only capture partial fingerprints. The researchers … continue reading

Google announces Espresso, Django 1.11 released, and Red Hat Software Collections 2.4 in beta — SD Times news digest: April 5, 2017

At the Open Networking Summit, Google announced Espresso, the latest offering in its software defined networking strategy. It is designed to make the Google cloud faster, more available and cost effective. “Espresso has been in production for over two years and routes 20 percent of our total traffic to the internet—and growing. It’s changing the … continue reading

IBM releases the Bluemix App ID

IBM is launching a new security authentication service for its developer platform Bluemix. The Bluemix App ID service provides tools to build third-party security authentication solutions without having extensive software security knowledge. With Bluemix App ID, developers can enable users to log into their applications using existing social media credentials from sites like Facebook and … continue reading

man on a computer

Free learning resources and tools for security savvy developers

Developers will never be responsible for all of security in an organization, but if they keep up with best practices, resources, and find new ways to secure and deliver good code, they could play a key role in developing resilient software. Today, most firms have a software security group (or SSG) or a product security … continue reading

MIT experts warn Trump administration about cybersecurity issues

MIT experts are urging the Trump administration to take cybersecurity more seriously. According to the experts, electric grids, oil pipelines, and other critical infrastructure in the U.S. pose huge hacking risks, but are widely ignored. “The digital systems that control critical infrastructure in the United States and most other countries are easily penetrated and architecturally … continue reading

Security Playbook 2017: How to improve practices this year

From LinkedIn to Yahoo, companies fell into the hands of hackers and identity thieves in 2016. Each year, companies seem to make the same security resolutions, only to face roadblocks like skill shortages, time constraints and budget issues, which prevent them from implementing good security practices. Experts recommended companies consider the following trends and predictions … continue reading

CodePen Projects

CodePen Projects, Mozilla’s Obsidian API proposal, ActiveGo Beta, HashiCorp Vault Enterprise 0.7 — SD Times news digest: March 22, 2017

A new platform wants to give developers a playground for developing front end web solutions. CodePen Projects is a place where developers can build websites right in their browser. According to the team, it is very similar to an Integrated Development Environment (IDE). It features a sidebar for viewing files; the ability to create, delete, … continue reading

Apache Tomcat 8.5.12, and 9.0.0.M18 alpha released

Apache Tomcat is updating its software to provide developers with early access to upcoming technology and support new features. The Apache Software Foundation (ASF) announced Apache Tomcat 8.5.12, and the alpha release of Tomcat 9.0.0.M18. “The Apache Tomcat software is an open source implementation of the Java Servlet, JavaServer Pages, Java Expression Language and Java … continue reading

DMCA.com Protection Status