security - search results
If you're not happy with the results, please do another search
Newly discovered vulnerabilities put businesses of all sizes at risk — and the penalties for data breaches reach new levels.
You’re a cyberattack target, and you may not be doing all you can to protect your clients and your ISV business.
Is the race to meet market demands making your customers and your business vulnerable? Take a new, agile approach to security.
Malicious URL identification, cryptojacking blocking, and blacklisting processes may need a refresh based on new attack strategies.
Digital Signage, Cyber Security, And Industry-Leading Speakers Mark D&H’s 2019 Technology Conference: West Coast...
Trends and Technologies such as ProAV Displays, DaaS, and Cloud Highlight D&H’s West Coast Event as the Distributor Expands its Tech Conference Value Proposition.
From the multifactor authorization you build into your applications and employee awareness training to a solid disaster recovery plan, build a multilayered defense against cyberthreats.
Unattended retail, contactless payments, and new security standards are set to make a big impact on the industry — and your ISV business.
Cybersecurity threats constantly change and evolve. Here’s a summary of some of the newest trends putting your clients at risk.
Software developers made strides to fix application security flaws faster, and a shift to automation and continuous delivery could make that process even more efficient.
Developers have the opportunity to contribute to OWASP projects — and make a big impact on application security. Learn how projects are managed by OWASP and how to get involved.
Insights that can help you provide solutions with more value for your customers by helping to secure their systems and their data.
Research for Veracode’s State of Software Security finds about one-fourth of flaws are still present a year after they’re discovered.
CA Veracode’s Latest State of Software Security Report Finds Organizations Implementing DevSecOps Address Flaws...
First Veracode analysis of flaw persistence finds 1 in 4 flaws remain open more than a year after discovery
Training and awareness need to work with tech solutions to build a comprehensive defense against cyberattack.
Cybersecurity myths lull SMBs into a false sense of security. The truth is SMBs are just as much a target are enterprises and must follow the same best practices to keep their businesses safe.