Search results for: software

week in review

Week in review: Spot deep-faked job candidates, data exfiltration via bookmarks, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Browser synchronization abuse: Bookmarks as a covert data exfiltration channel Two universal and seemingly innocuous browser features – the ability to create bookmarks (aka “favorites”) and browser synchronization – make users’ lives easier, but may also allow hackers to establish a covert data exfiltration channel. Ransomware gangs are hitting roadblocks, but aren’t stopping (yet) Ransomware attacks are in decline, according … More

Appointments

CloudBees appoints Anuj Kapur as President and CEO

CloudBees named Anuj Kapur as President and CEO. Previously a C-level executive at Cisco and SAP, Kapur brings experience in corporate strategy, product management, go-to-market strategy, and alliances in the enterprise technology sector to CloudBees. Kapur joins CloudBees at a pivotal time as all enterprises face the reality that software defines their competitiveness and dictates their success. Kapur will focus on accelerating product innovation, strengthening the go-to-market approach, furthering expansion, and scaling the company’s global … More

Appointments

Kevin Gallagher joins CoSoSys as CEO

CoSoSys has announced that Kevin Gallagher has joined as CEO to lead the company’s next chapter of growth. The news comes following CoSoSys’ North American enterprise and international expansion, with annual recurring revenue growth of more than 60% in 2021. CoSoSys’ Data Loss Prevention solution, Endpoint Protector, helps organizations to discover, monitor and protect their sensitive data; keeping it safe from accidental loss and data theft and preventing the operational disruption, regulatory issues, and reputational … More

Kubernetes

Organizations grew to love Kubernetes: Usage in production is high

Kubernetes is delivering business value and is set to win an increasing share of production workloads, with almost all respondents to a Dimensional Research study saying they plan to scale and diversify their Kubernetes infrastructures in some way in the coming year. Importantly, Kubernetes is already expanding beyond the familiar environments of the public cloud and data center. 35% of respondents already deploy Kubernetes at the edge. With growth comes increased complexity, and already those … More

Handshake

Seemplicity collaborates with Checkmarx to improve visibility and operational efficiency for organizations

Seemplicity announced that it has partnered with Checkmarx, a provider of developer-centric application security testing (AST) solutions. The partnership will see the Checkmarx One Platform integrated within Seemplicity’s Productivity Platform, allowing joint customers to simplify the entire find-to-fix lifecycle and ultimately accelerate the time to remediation of vulnerabilities found throughout the software development lifecycle (SDLC). The integration brings security findings discovered by Checkmarx into Seemplicity’s platform that provides a unified picture and workspace for risks … More

Handshake

Kion and Booz Allen Hamilton help government agencies manage their multi-cloud environments

Kion has partnered with Booz Allen Hamilton. This partnership will join Kion’s cloud enablement solution with Booz Allen’s technology transformation and managed services expertise to provide government clients with complete cloud management and governance capabilities. As application migration initiatives and the adoption of cloud-native capabilities accelerate across the public sector, more agencies are facing challenges in their multi-cloud environments. These challenges include manual labor to manage daily operations and security threats, along with a lack … More

security platform

Qualys CyberSecurity Asset Management 2.0 with EASM identifies unknown internet-facing assets

Qualys announced it is adding External Attack Surface Management (EASM) capabilities to the Qualys Cloud Platform. Integrated into CyberSecurity Asset Management 2.0, the new component adds the external attacker view to identify previously unknown internet-facing assets for a complete and accurate picture of the enterprise attack surface. Digital transformation, increased adoption of cloud and Internet of Things (IoT), a growing remote workforce, and a technology talent shortage have led to an exponential rise in organizations’ … More

security platform

Rimini Protect provides zero-day security protection against known and unknown vulnerabilities

Rimini Street has launched Rimini Protect, a new suite of security solutions that is always on and provides a layer of security that surrounds and protects enterprise IT infrastructure and applications. Rimini Street has provided “zero-day” security solutions for our clients’ enterprise software applications, middleware, and databases, and these solutions are now available with additional new offerings in the new Rimini Protect suite. Security protection is a top priority A data breach can harm organizations … More

Software

Contrast’s free SCA feature within CodeSec identifies vulnerable third-party libraries

Contrast Security announced that software composition analysis (SCA) is available for free in CodeSec. CodeSec offers free application security testing and SCA in a single, developer-friendly interface. The SCA feature will enable developers to identify vulnerable third-party libraries, getting secure code moving in minutes. With a frictionless install, scanning of open source software (OSS) and actionable results, developers can start to ship code while creating a standardized software bill of materials (SBOM) to manage supply … More

Software

Armory CD Self-Hosted and Managed 2.28 aids DevOps to deploy software at any scale

Armory introduces its CD Self-Hosted and Managed 2.28 product release that supports Armory’s commitment to empowering development teams to deploy software at any scale. Armory’s CD Self-Hosted and Managed 2.28 product release encompasses new features, optimizations, and contributions from the Spinnaker community to ensure development teams can deploy code with even greater confidence than ever before. This release embodies Armory’s commitment to providing Spinnaker and addressing the complex use cases development teams encounter. This includes … More

open source

Sparrow’s new solutions and features help users identify vulnerabilities in source code and web applications

At Black Hat USA 2022, Sparrow is announcing its newly upgraded Sparrow Cloud and open-source management solution, Sparrow SCA. Sparrow Cloud is a single platform for managing security and quality issues of both source code and web applications: running static and dynamic tests, checking test results, marking vulnerability status, and generating reports. Since its introduction in 2018 as a cloud-based static application security testing service, Sparrow Cloud has been evolving continuously. Sparrow Cloud added dynamic … More

Money

Thoma Bravo to acquire Ping Identity for $2.8 billion

Ping Identity announced that it has entered into a definitive agreement to be acquired by Thoma Bravo, a software investment firm, for $28.50 per share in an all-cash transaction valued at an Enterprise Value of approximately $2.8 billion. The offer represents a premium of approximately 63% over Ping Identity’s closing share price on August 2, 2022, the last full trading day prior to the transaction announcement, and a premium of 52% over the volume weighted … More