Supply chain security

CakeBoxx Technologies Appoints Erik Jensen as Chief Commercial Officer

Retrieved on: 
Tuesday, February 27, 2024

MCLEAN, Va., Feb. 27, 2024 /PRNewswire/ -- CakeBoxx Technologies, a globally recognized leader in sustainable, optimized cargo transportation and storage solutions is excited to announce the appointment of Erik Jensen as the company's new Chief Commercial Officer (CCO).

Key Points: 
  • MCLEAN, Va., Feb. 27, 2024 /PRNewswire/ -- CakeBoxx Technologies, a globally recognized leader in sustainable, optimized cargo transportation and storage solutions is excited to announce the appointment of Erik Jensen as the company's new Chief Commercial Officer (CCO).
  • "We are thrilled to welcome Erik Jensen to the CakeBoxx Technologies team as our new Chief Commercial Officer," said Daine Eisold, CEO of CakeBoxx Technologies.
  • "Erik will play a pivotal role in shaping CakeBoxx Technologies' commercial strategy, driving revenue growth, and forging key strategic relationships with current and future stakeholders.
  • "I am very excited to join CakeBoxx Technologies during this transformative period," said Erik Jensen.

Plainsight Technologies Introduces FilterBox to Translate Real-time Video into Valuable Business Metrics

Retrieved on: 
Wednesday, February 7, 2024

“FilterBox makes it easy to build, deploy, and manage computer vision applications,” said Logan Spears, CTO, Plainsight Technologies.

Key Points: 
  • “FilterBox makes it easy to build, deploy, and manage computer vision applications,” said Logan Spears, CTO, Plainsight Technologies.
  • Customers sensitive about data security, privacy, bandwidth limitations, cloud costs, or latency can run FilterBox collocated with the video streams.
  • “FilterBox has the potential to open up new business opportunities for us,” said James Joslin, President and Principal Engineer at MarineSitu.
  • Video Feed to Spreadsheet/Data Stream Pipeline – FilterBox connects to cameras or video streams over USB or network, and output usable data using industry-standard MQTT data.

Emerging ICS Trends Set to Reshape Cybersecurity Landscape at SANS Security East 2024

Retrieved on: 
Tuesday, January 30, 2024

BETHESDA, Md., Jan. 30, 2024 /PRNewswire-PRWeb/ -- In an era where digital transformation is paramount, Industrial Control Systems (ICS) stand at the forefront of technological evolution and cybersecurity. As we approach SANS Security East 2024, powered by an innovative ICS curriculum, it's crucial to recognize the emerging trends in ICS and their impact on critical infrastructure and cybersecurity landscapes.

Key Points: 
  • As we approach SANS Security East 2024 , powered by an innovative ICS curriculum, it's crucial to recognize the emerging trends in ICS and their impact on critical infrastructure and cybersecurity landscapes.
  • This evolving landscape underscores the need for robust cybersecurity measures in ICS.
  • The SANS Security East 2024 event, scheduled for February 19-24 in New Orleans and virtually, is set to be a landmark for cybersecurity professionals, offering a unique opportunity to gain hands-on cybersecurity training from top industry experts.
  • SANS Security East 2024 offers in-person and online courses, hands-on NetWars Tournaments, real-world cybersecurity training, interactive labs, course materials, and GIAC certifications.

Codacy Announces Semgrep Partnership, Extending AppSec Solution

Retrieved on: 
Friday, January 19, 2024

LISBON, Portugal, Jan. 19, 2024 /PRNewswire-PRWeb/ -- As cybersecurity risks for companies continue to soar yearly, exacerbated by the rapid rise of AI coding assistants, the imperative for robust and affordable code security solutions has never been more evident.

Key Points: 
  • Leading code analysis platform adds robust SAST security checks to provide a holistic code quality solution for all software development teams.
  • - Jaime Jorge - Codacy CEO
    Codacy , a platform that combines dozens of open source and commercial integrations to help software development teams ship clean, high-quality code faster, is extending its static application security testing (SAST) capabilities with an integration to Semgrep, a rising AppSec player.
  • With Codacy Security, we want companies to have comprehensive software security coverage without needing dozens of expensive and workflow changing tools.
  • It's time to shift AppSec left into a place developers want to engage with at a price anyone can afford.

ThreatNG Launches Groundbreaking Open-Source Governance and Compliance Dataset Project

Retrieved on: 
Wednesday, December 6, 2023

ThreatNG Security, a leading external attack surface management (EASM), digital risk protection (DRP), and security ratings cybersecurity solutions provider, is excited to announce the kickstart of its innovative open-source project, the " ThreatNG Governance and Compliance Dataset ."

Key Points: 
  • ThreatNG Security, a leading external attack surface management (EASM), digital risk protection (DRP), and security ratings cybersecurity solutions provider, is excited to announce the kickstart of its innovative open-source project, the " ThreatNG Governance and Compliance Dataset ."
  • By open-sourcing Governance and Compliance datasets, ThreatNG exemplifies its commitment to advancing the collective state of cybersecurity globally.
  • Financial Services find crucial insights in Ethics, Governance, Compliance, and Trust datasets, fostering integrity and compliance.
  • For more information about the ThreatNG Governance and Compliance Open-Source Project, please visit:

ThreatNG Security Launches Ransomware Susceptibility Assessment and Monitoring Solution

Retrieved on: 
Wednesday, November 29, 2023

ThreatNG Security, a leading provider of External Attack Surface Management (EASM), Digital Risk Protection (DRP), and Security Ratings solutions, announced the launch of its new Ransomware Susceptibility Assessment, Reporting, and Monitoring Solution today.

Key Points: 
  • ThreatNG Security, a leading provider of External Attack Surface Management (EASM), Digital Risk Protection (DRP), and Security Ratings solutions, announced the launch of its new Ransomware Susceptibility Assessment, Reporting, and Monitoring Solution today.
  • The ThreatNG Security Ransomware Susceptibility Assessment, Reporting, and Monitoring Solution empowers organizations to identify and mitigate their ransomware risk.
  • The Breach and Ransomware Susceptibility Score is one of the many X Susceptibility and eXposure scores that ThreatNG provides through its security ratings platform.
  • To learn more about how ThreatNG Security can safeguard your organization from the rising threat of ransomware, we invite everyone to explore the full suite of our Ransomware Susceptibility Assessment, Reporting, and Monitoring Solution along with signing up for a free evaluation at the following:

2023 Security Supply Chain ISO 28000 Audit Program

Retrieved on: 
Thursday, November 30, 2023

DUBLIN, Nov. 29, 2023 /PRNewswire/ -- The "Security Supply Chain ISO 28000 Audit Program - 2023 Gold Edition" report has been added to ResearchAndMarkets.com's offering.

Key Points: 
  • DUBLIN, Nov. 29, 2023 /PRNewswire/ -- The "Security Supply Chain ISO 28000 Audit Program - 2023 Gold Edition" report has been added to ResearchAndMarkets.com's offering.
  • The Security Supply Chain ISO 28000 Audit Program is provided in Excel and PDF formats.
  • The Security Supply Chain ISO 28000 Audit Program Gold Edition includes all the items in the premium version plus 25 full security management job descriptions which define specific roles and responsibilities and 28 electronic forms.
  • Supply Chain Audit program comes as an Excel Spreadsheet that is 23 pages in length with 369 individual audit points covering:
    ISO 28000 - Supply Chain Security - With companies that have a high reliance on just-in-time delivery, aging infrastructure and increased natural and human-made threats.

Fermyon First to Deliver Secure-By-Default Software Supply Chain for Serverless Apps

Retrieved on: 
Wednesday, November 1, 2023

Fermyon Technologies , the serverless WebAssembly company, today announced Fermyon Spin 2.0 , which implements the new WebAssembly Component Model to give developers unmatched security and productivity.

Key Points: 
  • Fermyon Technologies , the serverless WebAssembly company, today announced Fermyon Spin 2.0 , which implements the new WebAssembly Component Model to give developers unmatched security and productivity.
  • With increasing pressure to deliver software faster than ever before and vulnerabilities in open source libraries on the rise, it is estimated that software supply chain attacks have increased 742% over the past three years (source: Security Week, Cyber Insights 2023 ).
  • Spin 2.0 Key Benefits and Features:
    Supply Chain Security: Because each WebAssembly module is sandboxed by default, running untrusted libraries is much safer with Spin 2.0.
  • Fermyon will be showcasing Fermyon Spin 2.0 at the KubeCon North America conference in Chicago November 6-9.

Data Theorem Named an Industry Leader in Software Supply Chain Security by Leading Industry Analyst Firm KuppingerCole

Retrieved on: 
Tuesday, October 10, 2023

Data Theorem, Inc., a leading provider of modern application security , today announced that it has been named as an Industry Leader in Software Supply Chain Security (SSCS) by leading analyst firm KuppingerCole, in its Leadership Compass report published recently.

Key Points: 
  • Data Theorem, Inc., a leading provider of modern application security , today announced that it has been named as an Industry Leader in Software Supply Chain Security (SSCS) by leading analyst firm KuppingerCole, in its Leadership Compass report published recently.
  • Data Theorem was also named an Innovation Leader and a Market Leader in the software supply chain security space by KuppingerCole.
  • A complimentary copy of the KuppingerCole Software Supply Chain Security Leadership Compass report is available from the Data Theorem website at https://www.datatheorem.com/resources/reports/leadership-compass-softwar... .
  • “It is rewarding for Data Theorem to be named a software supply chain security industry leader and to be recognized for our full-stack application analysis and dynamic inventory discovery that best supports today’s challenges around software supply chain security,” said Doug Dooley, COO at Data Theorem.

Checkmarx Releases Version 3.0 of AI-Powered Checkmarx One™ Enterprise AppSec Platform

Retrieved on: 
Wednesday, October 11, 2023

ATLANTA, Oct. 11, 2023 /PRNewswire/ -- Checkmarx, the industry leader in cloud-native application security for the enterprise, today released version 3.0 of its AI-powered Checkmarx One™ enterprise AppSec platform. Purpose-built for enterprise cloud development, Checkmarx One 3.0 dramatically improves the end-to-end developer experience while expanding the AI-driven security capabilities of the platform's CheckAI Plug-in, its reporting and analytics capabilities and its Supply Chain Security solution.

Key Points: 
  • Industry's most complete, cloud-based enterprise AppSec solution leverages groundbreaking AI technology, streamlines end-to-end developer experience and expands Supply Chain Security capabilities
    ATLANTA, Oct. 11, 2023 /PRNewswire/ -- Checkmarx, the industry leader in cloud-native application security for the enterprise, today released version 3.0 of its AI-powered Checkmarx One™ enterprise AppSec platform.
  • "Checkmarx One is the AI-driven AppSec platform for today and for the future.
  • Enterprise CISOs now see the strength of their application security as critical to their overall security postures," said Sandeep Johri, CEO at Checkmarx.
  • All of this resulted in a 1600x increase in the number of vulnerabilities remediated for a significant boost to enterprise security."