Home Search

security - search results

If you're not happy with the results, please do another search
application security

Q3 2019 Security Update: How Much Can a Data Breach Cost?

Newly discovered vulnerabilities put businesses of all sizes at risk — and the penalties for data breaches reach new levels.

The Hard Truth About ISVs and Cybersecurity

You’re a cyberattack target, and you may not be doing all you can to protect your clients and your ISV business.
application security

Bringing Web App Security Up to Speed in the Era of DevOps

Is the race to meet market demands making your customers and your business vulnerable? Take a new, agile approach to security.

Q2 2019 Security Update: It May Be Time to Revise Cybersecurity Best Practices

Malicious URL identification, cryptojacking blocking, and blacklisting processes may need a refresh based on new attack strategies.
D&H

Digital Signage, Cyber Security, And Industry-Leading Speakers Mark D&H’s 2019 Technology Conference: West Coast...

Trends and Technologies such as ProAV Displays, DaaS, and Cloud Highlight D&H’s West Coast Event as the Distributor Expands its Tech Conference Value Proposition.
cyberthreat

Respond to Cyberthreats with a Layered Security Strategy

From the multifactor authorization you build into your applications and employee awareness training to a solid disaster recovery plan, build a multilayered defense against cyberthreats.
payment and security trends

Payment and Security Trends that Developers Should Look Out For

Unattended retail, contactless payments, and new security standards are set to make a big impact on the industry — and your ISV business.
cybersecurity threats

Q1 2019 Security Update: Cybersecurity Threats Continue to Evolve

Cybersecurity threats constantly change and evolve. Here’s a summary of some of the newest trends putting your clients at risk.
application security

Did ISVs Keep Up With Application Security in 2018?

Software developers made strides to fix application security flaws faster, and a shift to automation and continuous delivery could make that process even more efficient.

OWASP Projects Advance Application Security

Developers have the opportunity to contribute to OWASP projects — and make a big impact on application security. Learn how projects are managed by OWASP and how to get involved.

Q4 2018 Security Update: Want Access to an IoT System? Try 123456

Insights that can help you provide solutions with more value for your customers by helping to secure their systems and their data.

How Proficient are Your Developers at Fixing Application Security Flaws?

Research for Veracode’s State of Software Security finds about one-fourth of flaws are still present a year after they’re discovered.

CA Veracode’s Latest State of Software Security Report Finds Organizations Implementing DevSecOps Address Flaws...

First Veracode analysis of flaw persistence finds 1 in 4 flaws remain open more than a year after discovery

How ISVs can Overcome Human Error When it Comes to Network Security

Training and awareness need to work with tech solutions to build a comprehensive defense against cyberattack.

Debunk Cybersecurity Myths to Keep SMB Clients Safe

Cybersecurity myths lull SMBs into a false sense of security. The truth is SMBs are just as much a target are enterprises and must follow the same best practices to keep their businesses safe.

MOST POPULAR