Zebra Workstation Connect
pros and cons of open source

Open Source Software: Mitigating the Risks to Reap the Rewards

Despite evolving tremendously over the last 37 years, there remains an ongoing debate on the pros and cons of open source software.

January Patch Tuesday: Microsoft Issues CVE for Crypto Vulnerability

Microsoft also issues the final public patch releases for Windows 7, Server 2008, and Server 2008 R2.
payment-security

How ChatGPT Can Be Misused by Threat Actors

There are already reports of ChatGPT being used for malicious purposes, and there will inevitably be more.

Q3 2022 Security Update: Customized Ransomware Types Identified

Ransomware and other types of malware are now more customizable and tailored to victims.
mobile-application-security

Four Ways to Improve Your Mobile Application Security

Customers depend on developers to protect the devices and data used on their front lines.
cloud-security

OWASP: Application Security is Everyone’s Responsibility

The Open Web Application Security Project (OWASP) bridges the gap between security professionals and developers with valuable resources, tools, and events.

5 Ways to Speed Adoption of More Secure Email Environments

Email security hinges on usability, deployment model, and compliance support — or adoption rates will suffer.
biometric-authentication

6 Physical Security Trends Creating Opportunities for ISVs

Physical security trends are driven by the demand for more effective ways to secure facilities and control access.
cloud-security

Cloud Security Notification Framework (CSNF) Seeks to Standardize Security Notifications from Cloud Providers

Lack of control is holding cloud consumption back — successful development of the CSNF will break down those barriers.
Log4j-security

February 2022 Security Update: Life After Log4j

Get the latest on these vulnerabilities and steps you can take to mitigate your risks.
DevSecOps-security-kubernetes

Steering Toward DevSecOps: 3 Benefits of Kubernetes

Here's why Kubernetes is an effective platform to bring together development and operations for end-to-end security.

How Proficient are Your Developers at Fixing Application Security Flaws?

Research for Veracode’s State of Software Security finds about one-fourth of flaws are still present a year after they’re discovered.
cybersecurity-ISV-software

Q3 2020 Security Update: Threats Lurk in Seemingly Harmless Places

Everyday activities, such as opening an email, clicking on a link in search engine results or just plugging in a printer, can lead to a security incident or data loss.
healthcare-phi-data-breach

Healthcare Facilities Remain a Top Target for Data Breaches

Research identifies the impact cyberattacks have on this industry and the help they need to mitigate them.
patch-tuesday

March 2020 Patch Tuesday Commentary

Microsoft has resolved 115 unique common vulnerabilities and exposures, 26 of which were rated as Critical.

You May Also Like

Four Mistakes to Avoid When Creating an Environment for Human-Centric Development

Fostering an environment where human-centric development thrives requires motivated, valued, and empowered employees.

Open Source: A Boon for B2B Software Development?

Here are the benefits and potential drawbacks of open-source tools for B2B software developers.

July 2024: Security Update for B2B Software Developers

Healthcare hackings surge and here's why two-thirds of SMBs can't afford to skip cybersecurity monitoring.

Epson Expands Restaurant Support for mPOS and PC-POS Systems with TM-U220II Impact Receipt and Kitchen Printer

Durable printer combines exceptional performance and fast, high-quality output with a renowned industry standard design.
×