Home Search

security - search results

If you're not happy with the results, please do another search
security-software-testing

Cybersecurity Can’t Succeed Without No-Code. Here’s Why.

Security teams struggle to resource the people and the skills necessary to keep their organizations safe. No-Code can help.

Cybersecurity Tips for Developers

Software developers should keep the following four trends in mind when it comes to securing their solutions.
cyber-security

June 2022 Security Update: Microsoft Office, Mitel, and Bluetooth Vulnerabilities

Attack vectors multiply as threat actors explore new ways into systems and to access data.
security-software-testing

Closing the Security Skills Gap With Real-Time Security Training

Scanning and passing vulnerabilities downstream to overworked appsec teams isn’t really living up to the promise of shift left. It just shifts the problem left.
software-security

Businesses Are Taking Action to Build Strong Cybersecurity

Here are eight trends which point to the need for a strong cybersecurity posture in 2022.
Cyber Security Trends

May 2022 Security Update: 4 Cybersecurity Challenges

See what’s keeping IT security pros up at night and what the experts say can help overcome these challenges.
security-software-testing

Adapt Your Security Operations or Die

To accelerate business growth, ISVs must integrate their security practices with their business models.
SBOMs-software

Software Bill of Materials (SBOMs): Good for Security, Tough to Maintain

SBOMs have emerged as a key building block in software security and software supply chain risk management.
hacker-security-exploit-software

March 2022 Security Update: Okta Hack Acknowledged

Attackers target security solutions, state-sponsored groups exploit PrintNightmare, and the Open SSL vulnerability could give attackers a way to carry out denial-of-service attacks.
Log4j-security

February 2022 Security Update: Life After Log4j

Get the latest on these vulnerabilities and steps you can take to mitigate your risks.
Ondat logo

Trousseau Open Source Project Made Available to Add Security in Kubernetes

A universal way to manage secrets brings simplicity to implementations.
mobile-security

The Growth of Flutter (and the Need for Mobile App Security)

Here’s why Flutter adoption is growing and the security implications for organizations.
ransomware-security

January 2022 Security Update: Ransomware Insights from Insiders

Expect the playing field—and the players—to continually change concerning ransomware.
cyberattack-security-malware

4 Big Things to Know about Cybersecurity Today

Cybersecurity incidents have been rising steadily for several years, but there’s been an even more significant uptick in attacks since early 2020.
cybersecurity-ISV-software

November Cybersecurity Update: A Shift from Reactive to Proactive

Law enforcement is making progress – and offering bounties – to stop ransomware gangs.

You May Also Like

Blind Launch, Bleak Results: Why Skipping a Marketing Plan Can Doom Your New Solution

Launching a new software solution without a marketing plan is a critical mistake that can jeopardize the success of even the most innovative products.

The Rising Tide of AI-Augmented Software Development: A Pragmatic Overview of Efficiency and Productivity Gains

AI-augmented software development can automate repetitive and basic tasks, allowing organizations to redirect valuable resources to strategic initiatives.

How to Balance Client-Centricity with Profitability

Organizations serious about customer-centricity see higher revenue, better employee engagement, and more satisfied, long-term customers.

How Blockchain is Benefitting Healthcare

Blockchain is uniquely well-suited to address some of healthcare’s most intractable challenges stemming from fragmented, siloed information and processes.
×