Home Search

security - search results

If you're not happy with the results, please do another search

10 Remote Management and Password Security Best Practices Every ISV Should Follow

As the software market continues to grow and evolve at a rapid pace, it’s tempting for ISVs to focus on writing code that makes...

Advanced Payment Technology Could Address Security Concerns

Many of the changes in the payment processing ecosystem over the past few years have been made with heightened security in mind, as companies...

PCI Security Standards Council Issues Guidelines for Software-Based PIN Entry on Mobile

Today the PCI Security Standards Council (PCI SSC) announced a new PCI Security Standard for software-based PIN entry on commercial off-the-shelf devices (COTS), such...

Two Security Threats ISVs Can’t Ignore: Spectre and Meltdown

We all knew it wouldn’t be long before the next major computer security vulnerability scare would emerge, but I must admit this latest is...
Internet of Things

Integrated Security A Top Priority For IoT Deployments

IoT is increasingly permeating every aspect of consumer and enterprise activities. With the growth of microelectronics, ubiquitous connectivity, and cognition (predictive computing), IoT is...

Keep This Payment Security Checklist Handy

It’s no secret that developing applications becomes even more complex when you look to integrate payment processing. There are literally hundreds of pages of...

New Cannabis Financial Technology Event Issues Call for Speakers for Inaugural WeedTechUS Conference in...

The inaugural conference will include cannabis, hemp and CBD investor and stakeholder topics.
software testing

Software Testing: The Who, What, When, How, and Why

SmartBear’s annual testing community survey provides a look at the current state of software testing in the industry.

Smart Reads: Business Books for Software Developers

These business books for software developers offer insights into better business strategies, management, marketing, and communicating more effectively.

How Technology Can Rebuild Trust in Communications

Automation has enabled robocalls and online scams. Now it’s time for tech solutions that keep everyone honest.

Consumer Data Collection Meets AIDC Technology

AIDC technology is helping retailers and CPG brands learn more about their markets and how to capitalize on trends.

5 Trends that Will Impact ISV Businesses in 2020

How will IoT, cybersecurity solutions, progressive web apps, 5G and AI trends drive changes in your business?

6 Common Strategies for Cloud Migration

Choosing the right strategy for moving applications to the cloud is vital to cost-effectiveness, efficiency, and security.

January Patch Tuesday: Microsoft Issues CVE for Crypto Vulnerability

Microsoft also issues the final public patch releases for Windows 7, Server 2008, and Server 2008 R2.

7 DevOps Predictions: What Software Development Will Look Like in the 20s

Build, test, deploy takes top priority, automation gets more attention, and developers factor risk into their decision-making.

Most Popular