10 Remote Management and Password Security Best Practices Every ISV Should Follow

As the software market continues to grow and evolve at a rapid pace, it’s tempting for ISVs to focus on writing code that makes their software better and more powerful while overlooking key security...

How Does your Software Align with the Hottest M&A Trends?

At RSPA Inspire 2018, a business thought leadership conference I recently attended, Jeff Riley, VP of mergers and acquisitions, for The Corum Group, gave a presentation on the mergers and acquisitions (M&A) tech landscape....

First Data Could Get Tough with Unsecured Merchants

In a few days, First Data will start to disable the accounts of customers who access its systems over unsecure connections. The company has been sending out notifications and reminders for over a year about...

PCI Compliance Primer for ISVs

Software developers unfamiliar with the nuances of incorporating credit card processing into their software might wonder what the term “PCI compliance” is when they hear it and be confused about why it matters for...

PCI Security Standards Council Issues Guidelines for Software-Based PIN Entry on Mobile

Today the PCI Security Standards Council (PCI SSC) announced a new PCI Security Standard for software-based PIN entry on commercial off-the-shelf devices (COTS), such as smartphones and tablets. The PCI Software-Based PIN Entry on COTS...

Two Security Threats ISVs Can’t Ignore: Spectre and Meltdown

We all knew it wouldn’t be long before the next major computer security vulnerability scare would emerge, but I must admit this latest is a doozy – both in its timing and scope. Known...

6 Tips for Protecting Your Retail Customers from Cyberthreats

Last year there were so many security breaches, ranging from the U.S. Department of Justice to Yahoo, that it was difficult to keep track of them all. And this year — with WannaCry, Petya, the...

ISV Startups: Go Viral Without Spreading Malware

So, you’ve turned your big software idea into reality, and it’s ready to go. Now what? How do you get it into the hands of as many prospects as possible, so they can try...
Internet of Things

Integrated Security A Top Priority For IoT Deployments

IoT is increasingly permeating every aspect of consumer and enterprise activities. With the growth of microelectronics, ubiquitous connectivity, and cognition (predictive computing), IoT is poised for rapid growth. Whether malicious or accidental, malfunctioning IoT...

VARs, Integrators, MSPs, CSPs, and ISVs: DevPro Journal is Here to Help Your Software...

I’ve seen a lot of changes over the past 17+ years since I started covering the B2B IT space. Four trends stand out from those early years:  RFID. In the early 2000s, the promise of one-cent RFID tags and “lights out...

Keep This Payment Security Checklist Handy

It’s no secret that developing applications becomes even more complex when you look to integrate payment processing. There are literally hundreds of pages of rules and regulations by multiple bodies that you need to...

MOST POPULAR

Processing...
Thank you! Your subscription has been confirmed. You'll hear from us soon.
SUBSCRIBE TO OUR NEWSLETTER
join thousands of your peers
ErrorHere