Monthly Archives: January 2019

Synopsys Coverity

Synopsys Improves Coverity Static Application Security Testing

0
Synopsys announced on Jan. 15 that a new version of its Coverity Static Application Security Testing (SAST) technology is now available, providing organizations with...
Daily Tech Briefing Jan. 15

Trustwave Secure Email Gateway Now Supports Microsoft Azure RMS

0
Today’s topics include Trustwave improving its Secure Email Gateway to reduce email threats, and Hyatt launching a public bug bounty program.Trustwave announced the latest...
VoiceUI

Six Reasons Why You May Want to Rethink Voice UI Strategy

0
While businesses certainly value new customers, even more valuable are loyal customers who continue doing business with the company. One way to keep them...
Salesforce.commerce.cloud

Salesforce Updates Commerce Cloud With AI-Powered Recommendations

0
Looking to make a splash at the big National Retail Federation conference in New York City on Jan. 14, Salesforce previewed a major update...
Ping Identity_PO

Ping Identity Platform Review for 2021

0
Company description: Founded in 2002 by CEO Andre Durand, Ping Identity is headquartered in Denver, Colo. Ping Identity’s mission is to simplify how enterprises...
GDPR.2019

Predictions 2019: What’s in Store for Enterprise Information Practices

0
2018 was a landmark year in terms of impact to corporate data practices and compliance. The activation of Europe’s General Data Protection Regulation (GDPR)...
Metasploit 5

Open-Source Metasploit Framework 5.0 Improves Security Testing

0
Among the most widely used tools by security researchers is the open-source Metasploit Framework, which has now been updated with the new 5.0 release.Metasploit...
Daily Tech Briefing Jan. 14

Rometty Uses CES Stage to Outline the Value of ‘IBM Underneath’

0
Today’s topics include CEO Ginni Rometty detailing the value of IBM being “underneath” consumers’ services, and FireEye updating its server email security platform for...
CyberArk Play-with-Docker

Researchers Reveal Play With Docker Security Vulnerability

0
Security firm CyberArk reported on Jan. 14 that it discovered a security risk on the popular Play-with-Docker site that could have potentially enabled an...
Quantum.computing

Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security

0
The idea behind the use of quantum computers to break encryption lies in the fact that the encryption keys used by current encryption methods...