SDLC

New Relic Launches Secure Developer Alliance to Scale Security Observability

Retrieved on: 
星期二, 五月 7, 2024

RSA CONFERENCE — New Relic , the all-in-one observability platform for every engineer, launched Secure Developer Alliance .

Key Points: 
  • RSA CONFERENCE — New Relic , the all-in-one observability platform for every engineer, launched Secure Developer Alliance .
  • In addition, the Secure Developer Alliance includes access to the New Relic observability platform and its cloud-native security tools—including vulnerability management and IAST —so that members can provide their customers with actionable security insights.
  • The Secure Developer Alliance offers:
    Developer-Centric Security: Security tools and practices built for ease of use and seamless integration into existing development workflows.
  • For more information on the New Relic Secure Developer Alliance, please check out our blog and Secure Developer webpage.

Oracle Code Assist Can Help Developers Build Applications Faster with AI

Retrieved on: 
星期二, 五月 7, 2024

AUSTIN, Texas, May 7, 2024 /PRNewswire/ -- Oracle today announced plans for Oracle Code Assist, an AI code companion, to help developers boost velocity and enhance code consistency. Powered by large language models (LLMs) running on Oracle Cloud Infrastructure (OCI) and optimized for Java, SQL, and application development on OCI, Oracle Code Assist is planned to provide developers with context-specific suggestions that can be tailored to an organization's best practices and codebases. Oracle Code Assist will also be designed to be used to update, upgrade, and refactor code written in most modern programming languages.

Key Points: 
  • Oracle Code Assist is intended to help developers boost velocity, enhance code consistency, and will be optimized for Java, SQL, and Oracle Cloud Infrastructure-based applications
    AUSTIN, Texas, May 7, 2024 /PRNewswire/ -- Oracle today announced plans for Oracle Code Assist , an AI code companion, to help developers boost velocity and enhance code consistency.
  • Deployed as a development environment plugin for JetBrains IntelliJ IDEA or Microsoft Visual Studio Code, Oracle Code Assist is planned to be specifically trained to provide expert, opinionated feedback to help developers build, optimize, and upgrade applications wherever they are run.
  • "Organizations leveraging Oracle Code Assist can help developers increase velocity and code consistency to improve the long-term maintenance of applications in a safe, rigorous, and compliant manner."
  • Developers working at Oracle are actively using Oracle Code Assist today to build new Oracle products and services.

Legit Security Bolsters AI Supply Chain Security with Risky Model Detection

Retrieved on: 
星期二, 五月 7, 2024

BOSTON, May 7, 2024 /PRNewswire/ -- Legit Security, the leading platform for enabling companies to manage their application security posture across the complete developer environment, today announced new capabilities that allow customers to discover unsafe AI models in use throughout their software factories. These new capabilities provide actionable remediation steps to reduce AI supply chain security risk across the software development lifecycle (SDLC).

Key Points: 
  • These new capabilities provide actionable remediation steps to reduce AI supply chain security risk across the software development lifecycle (SDLC).
  • Still, from security vulnerabilities and training data to the method of storing and managing third-party AI models, outsourcing comes with risks.
  • For example, in late 2023 Legit's research team reported on the potential damage of AI supply chain attacks, such as " AI-Jacking ."
  • For security and development teams, this offers an essential tool against AI supply chain security risks by empowering organizations to flag models with unsafe files, insecure model storage, or a low reputation.

Drata Acquires oak9 and Announces New Compliance as Code Capabilities

Retrieved on: 
星期四, 五月 2, 2024

SAN DIEGO, May 2, 2024 /PRNewswire/ -- Drata, the leading compliance automation platform, announced today that it has acquired oak9, a cloud native security platform, and released a new capability in beta to seamlessly bring continuous compliance into the software development lifecycle. The acquisition positions Drata as the only platform of its kind that monitors compliance both before and after code is deployed to production. This capability, called Compliance as Code, will be demonstrated at RSA, May 6-9 in San Francisco.

Key Points: 
  • The acquisition positions Drata as the only platform of its kind that monitors compliance both before and after code is deployed to production.
  • Acquiring oak9 and launching Compliance as Code in Drata now equips thousands of DevSecOps, GRC, and engineering teams with the power to identify and remediate potential compliance violations as code is developed, instead of after it's deployed.
  • "Drata Compliance as Code empowers developers, engineers, and GRC teams to save countless hours by shifting compliance left in the SDLC, collectively improving security and code quality while fostering a culture of continuous compliance."
  • To see a demonstration of Drata Compliance as Code, visit booth 2133 at RSA, happening at Moscone Center in San Francisco, May 6-9.

Drata Acquires oak9 and Announces New Compliance as Code Capabilities

Retrieved on: 
星期四, 五月 2, 2024

SAN DIEGO, May 2, 2024 /PRNewswire/ -- Drata, the leading compliance automation platform, announced today that it has acquired oak9, a cloud native security platform, and released a new capability in beta to seamlessly bring continuous compliance into the software development lifecycle. The acquisition positions Drata as the only platform of its kind that monitors compliance both before and after code is deployed to production. This capability, called Compliance as Code, will be demonstrated at RSA, May 6-9 in San Francisco.

Key Points: 
  • The acquisition positions Drata as the only platform of its kind that monitors compliance both before and after code is deployed to production.
  • Acquiring oak9 and launching Compliance as Code in Drata now equips thousands of DevSecOps, GRC, and engineering teams with the power to identify and remediate potential compliance violations as code is developed, instead of after it's deployed.
  • "Drata Compliance as Code empowers developers, engineers, and GRC teams to save countless hours by shifting compliance left in the SDLC, collectively improving security and code quality while fostering a culture of continuous compliance."
  • To see a demonstration of Drata Compliance as Code, visit booth 2133 at RSA, happening at Moscone Center in San Francisco, May 6-9.

Top Five Applications Priorities for UK Technology Leaders in 2024 Published in New Report by Info-Tech Research Group

Retrieved on: 
星期一, 四月 29, 2024

LONDON, April 29, 2024 /PRNewswire/ -- As organisations continue to navigate the complexities of the digital era, which has been marked by exponential advancements in AI and technology, the strategic deployment of modern, practical applications has become indispensable for sustaining competitive advantage and realising business goals. Info-Tech Research Group's Applications Priorities 2024 report offers a comprehensive guide for applications leaders as it outlines the adoption of emerging technologies and practices to enhance organisational capabilities in 2024 and beyond.

Key Points: 
  • Info-Tech Research Group's Applications Priorities 2024 report offers a comprehensive guide for applications leaders as it outlines the adoption of emerging technologies and practices to enhance organisational capabilities in 2024 and beyond.
  • The Applications Priorities 2024 report provides applications leaders with a comprehensive overview of the applications landscape.
  • As the digital landscape continues to evolve at an exponential pace, the Applications Priorities 2024 report provides applications leaders with a guide to optimising their application portfolios and teams.
  • For exclusive media commentary from Info-Tech's subject matter experts and to access the complete Applications Priorities 2024 report, please contact [email protected] .

Outpost24 Introduces Application Security Expert Service to Eliminate False Positives

Retrieved on: 
星期二, 四月 30, 2024

Outpost24, a leading provider of cyber risk management and threat intelligence solutions, today announced the launch of its new Dynamic Application Security Testing (DAST) verification service, DAST Expert.

Key Points: 
  • Outpost24, a leading provider of cyber risk management and threat intelligence solutions, today announced the launch of its new Dynamic Application Security Testing (DAST) verification service, DAST Expert.
  • The new offering will provide organizations with in-depth analysis of application security scanning results, eliminating false positives and enabling security professionals to prioritize remediation efforts more effectively.
  • Security professionals often encounter false positives from automated scanning tools, posing widespread challenges in the industry.
  • Zero false positives: Combined with context-aware risk scoring of observations from application security scanning, our penetration testers will ensure false positives are eliminated.

JFrog Empowers a Secure AI Journey for Developers, Integrates with Databricks’ MLflow for a Seamless Machine Learning Lifecycle

Retrieved on: 
星期四, 四月 25, 2024

(“JFrog”) (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform , today announced a new machine learning (ML) lifecycle integration between JFrog Artifactory and MLflow , an open source software platform originally developed by Databricks .

Key Points: 
  • (“JFrog”) (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform , today announced a new machine learning (ML) lifecycle integration between JFrog Artifactory and MLflow , an open source software platform originally developed by Databricks .
  • By making each model immutable and traceable, companies can validate the security and provenance of ML models, enabling responsible AI practices.
  • For a deeper look at JFrog’s integration with MLflow to power ML and GenAI-powered app development, read this blog post .
  • @jfrog adds integration with @MLflow to help users create powerful #MLOps workflows and #GenAI-powered apps.

RWX Raises $7 Million in Seed Funding and Launches Mint, the Best Developer Experience in Continuous Integration

Retrieved on: 
星期三, 四月 24, 2024

RWX, the company building the best developer experience in Continuous Integration, announced that it raised $7M in seed funding in a round led by Quiet Capital in 2022.

Key Points: 
  • RWX, the company building the best developer experience in Continuous Integration, announced that it raised $7M in seed funding in a round led by Quiet Capital in 2022.
  • The company also announced the launch of Mint, a paradigm-shifting Continuous Integration and Continuous Deployment (CI/CD) platform.
  • CI/CD platforms are responsible for all the automation that runs on every code change an engineer makes.
  • Mint solves these problems and many more, providing the best developer experience in CI/CD.

Legit Security and Wiz Partner to Deliver Comprehensive Security and Visibility from Code to Cloud

Retrieved on: 
星期二, 四月 23, 2024

BOSTON, April 23, 2024 /PRNewswire/ -- Legit Security, the leading platform for enabling companies to manage their application security posture across the complete developer environment, today announced its partnership with Wiz, the industry's leading cloud security provider. Through this partnership, customers can seamlessly integrate Wiz's cloud security platform into their existing workflows within a Legit-powered AppSec program. For customers, this integration enables a single pane of glass to application risk from code to cloud, correlation of cloud risk to its code source for faster remediation, and cloud context to better prioritize and fix vulnerabilities.

Key Points: 
  • Through this partnership, customers can seamlessly integrate Wiz's cloud security platform into their existing workflows within a Legit-powered AppSec program.
  • WIN enables Wiz and Legit to share prioritized security findings with context, including inventory, vulnerabilities, issues, and configuration findings.
  • Contextual prioritization of risk: Combining Wiz and Legit enables mutual customers to monitor and manage their security posture from code to cloud effectively.
  • WIN enables a cloud security operating model where security and cloud teams work collaboratively to understand and control risks across their CI/CD pipeline.