Home Search

security - search results

If you're not happy with the results, please do another search
application security

April Security News Update: The U.S. Government Puts Plans in Motion to Protect Data

The U.S. government takes action to strengthen software security and protect personal and government data, while a study finds that insider threats are a significant risk to data security.
security-software-testing-2

How to Take Software to Market Fast and With Minimal Security Risks

The security threats introduced by modern development processes go beyond vulnerabilities in code. Here's where to look and what steps to take.
DevOps

Puppet’s 2024 State of DevOps Report Reveals Security is Strengthened by Platform Engineering

Survey respondents confirm built-in security and compliance are delivered by self-service platforms, along with efficiency and increased developer productivity.
application security

The Top 3 Security Threats Developers Need to Defend Against Right Now

APIs, the software supply chain, and containers are three attack vectors ISVs must secure. Here's how.
AI-use-cases

How AI Tackles Security, Then Unlocks Human Creativity in the Workplace

With AI reducing manual workloads, IT security teams can spend time innovating and, in turn, improve organizational security postures from reactive to proactive.
security-breach-attack

February 2024 Security Update: Research Shows 2023 Will Go Down in History as a Record-Breaking Year for Cyberattacks

Statistics show the cyberattack landscape was more active than ever in 2023. It begs the question, “What’s in store for 2024?”
cybersecurity-login-identity

A Practical Approach to Managing Modern Identity for a Stronger Security Posture

Despite its limitations, AI can be used today to strengthen an organization’s security posture. Here are a few best practices to help you get started immediately.
ISV-security

January 2024 Security Update: Secure International Elections

Cybersecurity news for January includes warnings about attacks targeting elections, greater phishing sophistication from generative AI, and zero-day attacks on iOS.
cloud-security

Closing the Cloud Security Gap: Insights, Challenges, and Solutions

Without robust modern cloud security measures, ISVs face the looming (and inevitable) threat of catastrophic cyberattacks.
IoT

IoT Security: Avoid These 5 Mistakes

Ensure your applications and customers don’t fall prey to these common IoT security missteps.
security-breach-attack

Security Update: The Most Significant Cybersecurity Trends for ISVs

Read this insider’s view of the most common threats and what the industry is doing to strengthen defenses.

November 2023 Security Update: LockBit claims responsibility for Canadian Government Employee Data Breach

LockBit claims responsibility for Canadian Government Employee Data Breach, while organizations fight back against other types of attacks with stronger security and greater transparency.
cyber-security

Three Cybersecurity Developments From 2023 That Will Shape 2024

Savvy solution providers will keep an eye on these three trends that can't afford to be ignored in 2024.
security-breach-attack

October 2023 Security Update: Database Provides Reports on Malicious Open-Source Packages

News of stronger attacks and more advanced defensive tools top this month’s security update.
national-cyber-security-awareness-month

How Will You Make the Most of Cybersecurity Awareness Month?

Remember, you aren’t just protecting data and networks. You’re contributing to business survival.

You May Also Like

4 Things ISVs Should Know About PCI DSS 4.0

Your ability to navigate PCI 4.0 changes is critical — both to strengthen your security posture and set your solutions apart in a crowded market.

Why Recovering Data in a Dynamic CRM Environment is Different

Backing up your dynamic systems has never been more important. Here's how to create a measured backup plan customized for your business.

How to Balance Client-Centricity with Profitability

Generating a profitable product requires empathizing with customers, providing customized solutions, and building an environment of brand loyalty.

Developers Need to Beat QR Code and @ Bypass Hackings

Organizations need cybersecurity solutions that are savvy enough to scan and flag questionable QR codes, attachments, and images, keeping ahead of hackers.
×