10 Remote Management and Password Security Best Practices Every ISV Should Follow

As the software market continues to grow and evolve at a rapid pace, it’s tempting for ISVs to focus on writing code that makes their software better and more powerful while overlooking key security...

Q3 2018 Security Update: ISVs Must Focus on Small Business, Latest Cyberthreats

You may have the solution that can keep your clients safe from current cyberattacks and security risks. Here are current security challenges your clients are facing and some actions you can take to help...

PCI Security Standards Council Issues Guidelines for Software-Based PIN Entry on Mobile

Today the PCI Security Standards Council (PCI SSC) announced a new PCI Security Standard for software-based PIN entry on commercial off-the-shelf devices (COTS), such as smartphones and tablets. The PCI Software-Based PIN Entry on COTS...

Can Anti-malware Prevent .LNK Cyberattacks?

Advice a short time ago was to tell your clients not to click on .EXE files, and email server security allowed people to reject emails with those attachments. Not to be undone, cybercriminals found...

PCI Compliance Primer for ISVs

Software developers unfamiliar with the nuances of incorporating credit card processing into their software might wonder what the term “PCI compliance” is when they hear it and be confused about why it matters for...

5 Practical Steps to Successful Partnerships with Offshore Software Development Teams

In this industry, talent can be hard to find. Forrester released the results of a study that found you may have to pay 20% above market salary rates this year when you’re looking for...

How Proficient are Your Developers at Fixing Application Security Flaws?

Research for Veracode’s State of Software Security finds about one-fourth of flaws are still present a year after they’re discovered.

VARs, Integrators, MSPs, CSPs, and ISVs: DevPro Journal is Here to Help Your Software...

I’ve seen a lot of changes over the past 17+ years since I started covering the B2B IT space. Four trends stand out from those early years:  RFID. In the early 2000s, the promise of one-cent RFID tags and “lights out...

6 Tips for Protecting Your Retail Customers from Cyberthreats

Last year there were so many security breaches, ranging from the U.S. Department of Justice to Yahoo, that it was difficult to keep track of them all. And this year — with WannaCry, Petya, the...

Two Security Threats ISVs Can’t Ignore: Spectre and Meltdown

We all knew it wouldn’t be long before the next major computer security vulnerability scare would emerge, but I must admit this latest is a doozy – both in its timing and scope. Known...

6 Physical Security Trends Creating Opportunities for ISVs

Physical security trends are driven by the demand for more effective ways to secure facilities and control access.

ISV Startups: Go Viral Without Spreading Malware

So, you’ve turned your big software idea into reality, and it’s ready to go. Now what? How do you get it into the hands of as many prospects as possible, so they can try...

5 Email Phishing Trends — What You Need to Know

Did you know that more than 90 percent of all successful cybersecurity attacks begin with email phishing? Not surprisingly, industry reports tell us it's only going to get worse in 2018 and beyond. Below are five phishing-related...

Q4 2018 Security Update: Want Access to an IoT System? Try 123456

Insights that can help you provide solutions with more value for your customers by helping to secure their systems and their data.

AI Predictions: How Your Clients Will Use Artificial Intelligence in 2019

Businesses are ready to enjoy the benefits of AI, but they need solutions to help them maximize the value it will provide.

MOST POPULAR