January Patch Tuesday: Microsoft Issues CVE for Crypto Vulnerability

Microsoft also issues the final public patch releases for Windows 7, Server 2008, and Server 2008 R2.
pros and cons of open source

Open Source Software: Mitigating the Risks to Reap the Rewards

Despite evolving tremendously over the last 37 years, there remains an ongoing debate on the pros and cons of open source software.

Q3 2022 Security Update: Customized Ransomware Types Identified

Ransomware and other types of malware are now more customizable and tailored to victims.
mobile-application-security

Four Ways to Improve Your Mobile Application Security

Customers depend on developers to protect the devices and data used on their front lines.
payment-security

How ChatGPT Can Be Misused by Threat Actors

There are already reports of ChatGPT being used for malicious purposes, and there will inevitably be more.
cloud-security

OWASP: Application Security is Everyone’s Responsibility

The Open Web Application Security Project (OWASP) bridges the gap between security professionals and developers with valuable resources, tools, and events.

5 Ways to Speed Adoption of More Secure Email Environments

Email security hinges on usability, deployment model, and compliance support — or adoption rates will suffer.
biometric-authentication

6 Physical Security Trends Creating Opportunities for ISVs

Physical security trends are driven by the demand for more effective ways to secure facilities and control access.
cloud-security

Cloud Security Notification Framework (CSNF) Seeks to Standardize Security Notifications from Cloud Providers

Lack of control is holding cloud consumption back — successful development of the CSNF will break down those barriers.
Log4j-security

February 2022 Security Update: Life After Log4j

Get the latest on these vulnerabilities and steps you can take to mitigate your risks.
DevSecOps-security-kubernetes

Steering Toward DevSecOps: 3 Benefits of Kubernetes

Here's why Kubernetes is an effective platform to bring together development and operations for end-to-end security.

How Proficient are Your Developers at Fixing Application Security Flaws?

Research for Veracode’s State of Software Security finds about one-fourth of flaws are still present a year after they’re discovered.

First Data Could Get Tough with Unsecured Merchants

In a few days, First Data will start to disable the accounts of customers who access its systems over unsecure connections. The company has been sending out notifications and reminders for over a year about changes that will be made to its Datawire service beginning on February 15th. If merchants have taken...
patch-tuesday

March 2020 Patch Tuesday Commentary

Microsoft has resolved 115 unique common vulnerabilities and exposures, 26 of which were rated as Critical.
software-security

Businesses Are Taking Action to Build Strong Cybersecurity

Here are eight trends which point to the need for a strong cybersecurity posture in 2022.

You May Also Like

Leveraging AI to Revolutionize Field Service Operations

Field service ISVs can unlock growth opportunities by making AI’s capabilities accessible to their clients.

February 2024 Security Update: Research Shows 2023 Will Go Down in History as a Record-Breaking Year for Cyberattacks

Statistics show the cyberattack landscape was more active than ever in 2023. It begs the question, “What’s in store for 2024?”

13 KPIs Every ISV Should Track

These metrics can help ISVs evaluate current health and enable agility in adapting to market changes and competition. 

The Countdown to Microsoft’s New Commerce Experience (NCE)

Follow this checklist to navigate the transition with little or no disruption to your daily operations.
×