software-security

Businesses Are Taking Action to Build Strong Cybersecurity

Here are eight trends which point to the need for a strong cybersecurity posture in 2022.

Q1 2020 Security Update: New Vulnerabilities Discovered, Cybercriminals Charged

New vulnerabilities put specific devices or systems at risk, US-CERT issues warnings about Dridex malware, and cybercriminals are charged and sentenced.
healthcare-phi-data-breach

Healthcare Facilities Remain a Top Target for Data Breaches

Research identifies the impact cyberattacks have on this industry and the help they need to mitigate them.

Software Security Update: July 2020 Patch Tuesday

In total, Microsoft resolved 123 unique vulnerabilities, 18 of which are rated as Critical. Commentary is also provided on Oracle and Adobe updates.
mobile-application-security

Why is Mobile App Security “Shifting Left?”

Mobile developers have looked towards DevSecOps to seamlessly close the security risk gap without introducing cumbersome security processes.
it-security-trends-2021

7 Eye-Opening Security Predictions for 2021

The cybersecurity landscape continues its rapid evolution. Make sure your users – and your own organization – are ready.
mobile-application-security

The Fundamentals of Protecting Mobile Devices

Follow these cybersecurity best practices to physically and virtually secure mobile devices by applying multiple layers of protection.
mobile-application-security

Why Mobile Application Security is Still an Afterthought

In the rush to take user-friendly mobile applications to market, many software developers are leaving their customers vulnerable to cyberattacks and data loss.
hacker-security-exploit-software

March 2022 Security Update: Okta Hack Acknowledged

Attackers target security solutions, state-sponsored groups exploit PrintNightmare, and the Open SSL vulnerability could give attackers a way to carry out denial-of-service attacks.

OWASP Projects Advance Application Security

Developers have the opportunity to contribute to OWASP projects — and make a big impact on application security. Learn how projects are managed by OWASP and how to get involved.
cybersecurity threats

Q1 2019 Security Update: Cybersecurity Threats Continue to Evolve

Cybersecurity threats constantly change and evolve. Here’s a summary of some of the newest trends putting your clients at risk.
cloud native security

Adopt New Patterns for Security, Compliance in the World of Containers

A cloud native approach changes how software is built, deployed, and run, which changes how systems need to be protected and tested.

VARs, Integrators, MSPs, CSPs, and ISVs: DevPro Journal is Here to Help Your Software Business Flourish

I’ve seen a lot of changes over the past 17+ years since I started covering the B2B IT space. Four trends stand out from those early years:  RFID. In the early 2000s, the promise of one-cent RFID tags and “lights out warehousing” seemed right around the corner. Like all big ideas, the vision can be years ahead of the...
edge-computing

Meeting 2021 at the Edge: 5 IT Advancements Paving the Way

Several IT advancements are helping to usher in the delivery and secure evolution of an exciting new future technology landscape.
cyber-security

June 2022 Security Update: Microsoft Office, Mitel, and Bluetooth Vulnerabilities

Attack vectors multiply as threat actors explore new ways into systems and to access data.

You May Also Like

Leveraging AI to Revolutionize Field Service Operations

Field service ISVs can unlock growth opportunities by making AI’s capabilities accessible to their clients.

February 2024 Security Update: Research Shows 2023 Will Go Down in History as a Record-Breaking Year for Cyberattacks

Statistics show the cyberattack landscape was more active than ever in 2023. It begs the question, “What’s in store for 2024?”

13 KPIs Every ISV Should Track

These metrics can help ISVs evaluate current health and enable agility in adapting to market changes and competition. 

The Countdown to Microsoft’s New Commerce Experience (NCE)

Follow this checklist to navigate the transition with little or no disruption to your daily operations.
×