First Data Could Get Tough with Unsecured Merchants

In a few days, First Data will start to disable the accounts of customers who access its systems over unsecure connections. The company has been sending out notifications and reminders for over a year about...

How Proficient are Your Developers at Fixing Application Security Flaws?

Research for Veracode’s State of Software Security finds about one-fourth of flaws are still present a year after they’re discovered.

OWASP: Application Security is Everyone’s Responsibility

The Open Web Application Security Project (OWASP) bridges the gap between security professionals and developers with valuable resources, tools, and events.

6 Physical Security Trends Creating Opportunities for ISVs

Physical security trends are driven by the demand for more effective ways to secure facilities and control access.

Q3 2018 Security Update: ISVs Must Focus on Small Business, Latest Cyberthreats

You may have the solution that can keep your clients safe from current cyberattacks and security risks. Here are current security challenges your clients are facing and some actions you can take to help...

How Does your Software Align with the Hottest M&A Trends?

At RSPA Inspire 2018, a business thought leadership conference I recently attended, Jeff Riley, VP of mergers and acquisitions, for The Corum Group, gave a presentation on the mergers and acquisitions (M&A) tech landscape....

Keep This Payment Security Checklist Handy

It’s no secret that developing applications becomes even more complex when you look to integrate payment processing. There are literally hundreds of pages of rules and regulations by multiple bodies that you need to...

ISV Startups: Go Viral Without Spreading Malware

So, you’ve turned your big software idea into reality, and it’s ready to go. Now what? How do you get it into the hands of as many prospects as possible, so they can try...

Two Security Threats ISVs Can’t Ignore: Spectre and Meltdown

We all knew it wouldn’t be long before the next major computer security vulnerability scare would emerge, but I must admit this latest is a doozy – both in its timing and scope. Known...

VARs, Integrators, MSPs, CSPs, and ISVs: DevPro Journal is Here to Help Your Software...

I’ve seen a lot of changes over the past 17+ years since I started covering the B2B IT space. Four trends stand out from those early years:  RFID. In the early 2000s, the promise of one-cent RFID tags and “lights out...

Q2 2018 Security Update: Cyberthreat Watch for Software Developers

The cyberthreat landscape is always changing, so it’s vital to stay informed of trends that can impact your business. Here are four cybersecurity challenges your clients need solutions for today: Email Attacks, Phishing and Spear...
application security

Did ISVs Keep Up With Application Security in 2018?

Software developers made strides to fix application security flaws faster, and a shift to automation and continuous delivery could make that process even more efficient.

5 Practical Steps to Successful Partnerships with Offshore Software Development Teams

In this industry, talent can be hard to find. Forrester released the results of a study that found you may have to pay 20% above market salary rates this year when you’re looking for...

OWASP Projects Advance Application Security

Developers have the opportunity to contribute to OWASP projects — and make a big impact on application security. Learn how projects are managed by OWASP and how to get involved.

AI Predictions: How Your Clients Will Use Artificial Intelligence in 2019

Businesses are ready to enjoy the benefits of AI, but they need solutions to help them maximize the value it will provide.

MOST POPULAR