-
Data security firm Rubrik has announced a collaboration with open-source software maker Red Hat to integrate Red Hat OpenShift Virtualization into Rubrik Security Cloud, aiming to streamline data protection for virtualized environments and enhance cyber resilience. The solution is expected to be generally available early next year.
-
By John K. Waters
Identity platform provider Stytch launches new device fingerprinting capabilities designed to provide enhanced fraud and bot protection for developers. The upgrade incorporates advanced AI functionality, offering an easy-to-integrate solution for boosting security within authentication flows, the company said. Stytch’s technology aims to provide seamless and highly accurate bot detection, reducing user friction and enhancing security without visible interventions.
-
By John K. Waters
JFrog has introduced a new runtime security solution aimed at enhancing software integrity and streamlining collaboration between developers and security teams. The addition of JFrog Runtime to the company’s existing security tools is meant to empower enterprises to embed security at every stage of the software development process, the company said, from writing source code to deploying applications in production.
-
Security firm CrowdStrike has revealed that a flaw in its testing software led to a faulty update, causing more than 8.5 million Windows systems to crash last week. In a blog post published today, the Austin-based company provided more details on the incident, which resulted in flight cancellations and disruptions to public services, including 911 systems.
-
By John K. Waters
A new JFrog survey found that malicious actors see the software supply chain (SSC) as the new "soft target," because there are fewer protections in place than in other enterprise systems. But there's a "significant disconnect" between senior executives/managers and developers when it comes to enterprise application security.
-
By John K. Waters
Waratek combines a Log4J Vulnerability Scanner and API security in its Java Security Platform to provide users with the ability to scale strategic risk mitigation in the enterprise.
-
By John K. Waters
White House publishes guidelines requiring government agencies to obtain formal assurances from third-party software providers that they are following secure software development practices.
-
By John K. Waters
The Spring Security team plans to release Spring Authorization Server, it long-awaited in November of this year.
-
By Mark J. Balbes, Ph.D.
Our Agile Architect wants to talk about lessons learned from his experiences with test automation. As usual, he does it in his own unique way.
-
By John K. Waters
App security tools provider Contrast Security adds software composition analysis capabilities to its free in CodeSec "developer-first" scanner.
-
By John K. Waters
Application security testing company Checkmarx and cybersecurity workflow and productivity startup Seemplicity today announced a new partnership aimed at simplifying the "find-to-fix" lifecycle and accelerating the time to remediation of vulnerabilities found throughout the software development lifecycle .
-
By John K. Waters
Veeam Software kicks off its annual user conference with a product roadmap that showcases features planned for the release of Veeam Backup & Replication v12, as well as key solution innovations for cloud-native solutions, SaaS offerings, and some deeper integrations of Kasten by Veeam K10 for Kubernetes.
-
By John K. Waters
The OpenSSF announced 19 new members, including Citi, Huawei, Spotify, Alibaba, and JFrog, who added their names to a roster that already includes Google, Microsoft, AWS, Meta, and Cisco.
-
By John K. Waters
Cybersecurity solutions provider Contrast Security unveils four new GitHub Actions aimed at making the process of automating security testing within native pipelines more accessible to developers.
-
By John K. Waters
The Application Security Division of NTT Ltd. releases a solution designed to make it possible for developers to conduct dynamic application security testing (DAST) at each phase of the software development cycle.
-
The U.S. Federal Trade Commission intends to use its "full legal authority to pursue companies that fail to take reasonable steps to protect consumer data from exposure as a result of the Log4j vulnerability," the commission warned.
-
By John K. Waters,
Kurt Mackie
A critical-remote code execution vulnerability in the widely used Log4j open-source Java logging library, "has given cybercriminals the perfect attack campaign on a silver platter."
-
By John K. Waters
Synopsys, a provider of electronic design automation (EDA), semiconductor IP, and application security testing tools and services, acquires app vulnerability management company Code Dx.
-
By John K. Waters
Cybersecurity pros have a new online resource, the RSAC Marketplace, which its creators describe as "the equivalent of a year-round RSA expo."
-
By John K. Waters
Sonatype expands the latest version of its Nexus platform to offer "full-spectrum control of the cloud-native software development lifecycle."
-
By John K. Waters
GrammaTech today announced a technology partnership with GitLab to integrate the GrammaTech CodeSonar Static Application Security Testing solution with GitLab's Ultimate DevSecOps platform.
-
By John K. Waters
Application Security Testing solutions provider Veracode today announced the launch of a two-week collegiate competition designed to challenge student teams in the U.S. and the U.K. to test their secure coding skills.
-
By John K. Waters
Software security solutions provider Checkmarx today launched a new open-source static analysis tool designed to allow developers to write more secure infrastructure-as-code.
-
Java apps earn higher security vulnerability score than .NET apps, a Contrast Lab report finds.
-
By John K. Waters
A new report from Application Security Testing (AST) solutions provider Veracode shows that software developers working in the retail and hospitality sector are fixing flaws in their companies' software at a faster rate than five other sectors--despite having to work with applications that tend to be older and larger than other sectors.