First Data Could Get Tough with Unsecured Merchants

In a few days, First Data will start to disable the accounts of customers who access its systems over unsecure connections. The company has been sending out notifications and reminders for over a year about...

Q4 2018 Security Update: Want Access to an IoT System? Try 123456

Insights that can help you provide solutions with more value for your customers by helping to secure their systems and their data.
cyberthreat

Respond to Cyberthreats with a Layered Security Strategy

From the multifactor authorization you build into your applications and employee awareness training to a solid disaster recovery plan, build a multilayered defense against cyberthreats.

How Does your Software Align with the Hottest M&A Trends?

At RSPA Inspire 2018, a business thought leadership conference I recently attended, Jeff Riley, VP of mergers and acquisitions, for The Corum Group, gave a presentation on the mergers and acquisitions (M&A) tech landscape....

6 Tips for Protecting Your Retail Customers from Cyberthreats

Last year there were so many security breaches, ranging from the U.S. Department of Justice to Yahoo, that it was difficult to keep track of them all. And this year — with WannaCry, Petya, the...

CA Veracode’s Latest State of Software Security Report Finds Organizations Implementing DevSecOps Address Flaws...

First Veracode analysis of flaw persistence finds 1 in 4 flaws remain open more than a year after discovery
IT solutions

How Next-Gen Software Solutions Are Creating Next-Gen Problems

Next-gen solutions are introducing your clients to next-gen challenges related to compliance, security, and business continuity.

Keep This Payment Security Checklist Handy

It’s no secret that developing applications becomes even more complex when you look to integrate payment processing. There are literally hundreds of pages of rules and regulations by multiple bodies that you need to...

Two Security Threats ISVs Can’t Ignore: Spectre and Meltdown

We all knew it wouldn’t be long before the next major computer security vulnerability scare would emerge, but I must admit this latest is a doozy – both in its timing and scope. Known...

PCI Compliance Primer for ISVs

Software developers unfamiliar with the nuances of incorporating credit card processing into their software might wonder what the term “PCI compliance” is when they hear it and be confused about why it matters for...
payment and security trends

Payment and Security Trends that Developers Should Look Out For

Unattended retail, contactless payments, and new security standards are set to make a big impact on the industry — and your ISV business.

Can Anti-malware Prevent .LNK Cyberattacks?

Advice a short time ago was to tell your clients not to click on .EXE files, and email server security allowed people to reject emails with those attachments. Not to be undone, cybercriminals found...

OWASP Projects Advance Application Security

Developers have the opportunity to contribute to OWASP projects — and make a big impact on application security. Learn how projects are managed by OWASP and how to get involved.

How ISVs can Overcome Human Error When it Comes to Network Security

Training and awareness need to work with tech solutions to build a comprehensive defense against cyberattack.

VARs, Integrators, MSPs, CSPs, and ISVs: DevPro Journal is Here to Help Your Software...

I’ve seen a lot of changes over the past 17+ years since I started covering the B2B IT space. Four trends stand out from those early years:  RFID. In the early 2000s, the promise of one-cent RFID tags and “lights out...

MOST POPULAR