Monthly Archives: January 2019
Synopsys Improves Coverity Static Application Security Testing
Synopsys announced on Jan. 15 that a new version of its Coverity Static Application Security Testing (SAST) technology is now available, providing organizations with...
Trustwave Secure Email Gateway Now Supports Microsoft Azure RMS
Today’s topics include Trustwave improving its Secure Email Gateway to reduce email threats, and Hyatt launching a public bug bounty program.Trustwave announced the latest...
Six Reasons Why You May Want to Rethink Voice UI Strategy
While businesses certainly value new customers, even more valuable are loyal customers who continue doing business with the company. One way to keep them...
Salesforce Updates Commerce Cloud With AI-Powered Recommendations
Looking to make a splash at the big National Retail Federation conference in New York City on Jan. 14, Salesforce previewed a major update...
Ping Identity Platform Review for 2021
Company description: Founded in 2002 by CEO Andre Durand, Ping Identity is headquartered in Denver, Colo. Ping Identity’s mission is to simplify how enterprises...
Predictions 2019: What’s in Store for Enterprise Information Practices
2018 was a landmark year in terms of impact to corporate data practices and compliance. The activation of Europe’s General Data Protection Regulation (GDPR)...
Open-Source Metasploit Framework 5.0 Improves Security Testing
Among the most widely used tools by security researchers is the open-source Metasploit Framework, which has now been updated with the new 5.0 release.Metasploit...
Rometty Uses CES Stage to Outline the Value of ‘IBM Underneath’
Today’s topics include CEO Ginni Rometty detailing the value of IBM being “underneath” consumers’ services, and FireEye updating its server email security platform for...
Researchers Reveal Play With Docker Security Vulnerability
Security firm CyberArk reported on Jan. 14 that it discovered a security risk on the popular Play-with-Docker site that could have potentially enabled an...
Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security
The idea behind the use of quantum computers to break encryption lies in the fact that the encryption keys used by current encryption methods...