Categories
Risk Management

Microsoft Build 2019: Visual Studio Expands, .NET Evolves and Windows Gets a Kernel

Reading Time: 3 minutes

For the third year in a row, Microsoft’s Build conference set up shop in the Washington State Convention Center, giving technology professionals a glimpse into what lies ahead for the Redmond giant. 

Previous years highlighted key advancements such as Microsoft 365, the Azure Cosmos DB and Xamarin — in 2019, the company went all-in with announcements for a new Visual Studio, .NET evolution and the emergence of true Linux on Windows OS. 

Categories
Dotfuscator CE

RSAC 2019 Roundup: NIST Gets Structural as the NSA Goes Open Source

Reading Time: 3 minutes

The booths are gone, the lights are off and the conference halls are empty. It’s a wrap for RSAC 2019, but IT pros aren’t going home empty-handed: Here’s a roundup of this year’s key topics, critical outcomes and biggest surprises.

Categories
Risk Management

Hardened Apps = Harder Target = Reduced Corporate Risk

Reading Time: 3 minutes

There’s an app for that.

Apple’s (now trademarked) slogan is perhaps more telling than the company intended: Organizations rise and fall on the strength of applications — well-integrated, full-featured apps can help drive market success, while offerings more limited in scope and functionality may prove disastrous.

Categories
Risk Management

GDPR Goes After Google — And Your App Could be Next

Reading Time: 3 minutes

GDPR fines were inevitable. Despite years of lead-up and months of warning before the legislation came into effect last May, many companies simply weren’t prepared for the complex (and evolving) nature of EU privacy expectations.

Categories
Risk Management

Data Breaches in 2019: Why the Hackers are Winning (And What You Can do About It)

Reading Time: 3 minutes

Hackers are winning. As noted by Information Age, data breach reports are up 75 percent over the last two years — while part of this increase is tied to emerging legislation and disclosure requirements, a quick look at tech headlines makes it clear that attackers are coming out ahead in the fight to keep corporate networks, applications and data secure.

Categories
Risk Management

Shift Left: The Case for “Time-Traveling” App Security

Reading Time: 3 minutes

Time is of the essence for application security — the sooner IT teams can detect potential attacks and the longer it takes cybercriminals to crack app code, the better your business outcomes. 

Categories
Risk Management

Hacked Hospitality: Marriott Data Breach Puts 500 Million Guests at Risk

Reading Time: 3 minutes

Hotel chain Marriott International isn’t having a good week: As reported by The New York Times, the company announced that its reservation database for Starwood-branded properties had been hacked. The numbers aren’t great, with initial data suggesting that 500 million guest records have been compromised across records dating back to 2014.

Categories
Dotfuscator CE

Software Development Continues to Evolve

Reading Time: 3 minutes

It’s no longer enough to just make great software. Now, mobile-enabled, always-connected users demand applications capable of meeting them where they are — without sacrificing quality, performance, or protection. This means easy to use, intuitive software that’s always available, always secure, and always works, delivered at a fast cadence.

Categories
Risk Management

Artificial Intelligence, Real Threats: Can Attackers Flip the AI Script?

Reading Time: 4 minutes

There’s big money in artificial intelligence (AI) — reaching almost $12 billion over the next six years. As noted by research firmMcKinsey & Company, companies are now in the process of building out the technology foundation they need for AI deployment, with 45 percent of executives already worried about not investing enough in AI to keep up with the competition. It’s not a baseless fear: The McKinsey research also suggests that AI adoption is following a standard “S-Curve” model, which starts with slow adoption by a limited number of businesses followed by rapid mass adoption as market opportunities increase and then slows again as stragglers are left behind. 

Categories
Risk Management

No Second Chances: App Shielding and the Emerging Need for DevSecOps

Reading Time: 3 minutes

App development now happens at breakneck speeds as companies recognize the need for first-to-market applications that exceed consumer expectations for usability and performance. The root of this rapid release cycle? DevOps — the combination of development and operations teams to deliver best-in-class applications ASAP.