All blogs

Bug bounty in practice: the final layer of security

Bug bounty in practice: the final layer of security

What does a bug bounty program look like, and what does it deliver? We talk to Visma about its usefulness for security professionals and the ultimate benefit for the user of the software. "With the bug bounty program, we have extra eyes looking at our products," explains Chief Information Securi... Read more

date5 hours ago
Application testing democratised via GenAI in Tricentis Copilot

Application testing democratised via GenAI in Tricentis Copilot

Software application development is benefiting from AI-assisted testing at the ‘back end’ of enterprise IT systems in order to make our business apps bug-free, more functionally complete and safer. Among the firms pushing forward AI tools of this kind is continuous testing and quality engineeri... Read more

date1 day ago
Wiz nearing acquisition of Lacework for a bargain

Wiz nearing acquisition of Lacework for a bargain

A week after it acquired Gem Security, Wiz is already aiming for its next target. Lacework, which once seemed to be worth nearly 8 billion euros, is said to cost between 140 million and 190 million euros. A letter of intent is said to have already been written to finalize the proposed acquisitio... Read more

date4 days ago
Meta unveils powerful open-source model Llama 3 and chatbot Meta AI

Meta unveils powerful open-source model Llama 3 and chatbot Meta AI

Meta has announced Llama 3, the successor to the highly successful open-source model Llama 2. Along with the new LLM debuts Meta AI, one of the best AI assistants in the world, according to the company. Llama 3 launches with two models: the compact Llama 3-8B (8 billion parameters), which can be... Read more

date4 days ago
How did Phishing-as-a-Service group LabHost operate?

How did Phishing-as-a-Service group LabHost operate?

With "Operation PhishOFF," phishing gang LabHost appears to have exited the cybercrime stage. This criminal group was broken up through international cooperation between 18 countries and security services. But how did the LabHost members operate? And how did they eventually get caught? LabHost w... Read more

date5 days ago
Google hints at breakthrough for LLMs with Infini-attention

Google hints at breakthrough for LLMs with Infini-attention

Google researchers claim they've cracked the code to give large language models (LLMs) the literary equivalent of an endless appetite. Their latest paper unveils 'Infini-attention,' a technique that supposedly lets models munch on input of infinite length without getting indigestion from memory ove... Read more

date6 days ago
Process HQ steals the show in 24.2 release of Appian Platform

Process HQ steals the show in 24.2 release of Appian Platform

Process mining is taking on an increasingly important role within Appian's automation and orchestration platform. It should provide both more insights into organizations' processes, but also into the underlying Data Fabric. Of course, there is also the necessary space and focus on AI in version 24.... Read more

date7 days ago
1 2 3 99