Software Development

Software Development | News, how-tos, features, reviews, and videos

Triangular alert with exclamation mark amid abstract binary and sketches of scattered books.
layered image of male executive holding thumbs up in CMYK

conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Tech Spotlight   >   The Future of Work [Overview]   >   A crystal ball for peering into the future.

The future of work: Coming sooner than you think

What will your worklife be like years from now? Today's work-from-home world has given us a glimpse of the future, as these five articles from CIO, Computerworld, CSO, InfoWorld, and Network World illustrate.

programmer certification skills code devops glasses student by kevin unsplash

Top 10 in-demand cybersecurity skills for 2021

The list of needed security skills is long and growing. Here's what experts say is driving the demand.

cso ts ai ml by just super getty images 2400x1600

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.

open source box open box out of the box empty

Using open source for identity projects: 8 considerations

Consider these eight points to decide whether you can securely use open-source code in your identity management projects.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

21 best free security tools

Check out these free, standout software tools that will make your daily security work easier.

man typing on laptop search internet web browswer

8 top open source intelligence tools

OSINT (open source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.

dark secrets of devops code secret quiet by kristina flour unsplash

The state of application security: What the statistics tell us

Companies are moving toward a DevSecOps approach to application development, but problems remain with security testing ownership and open-source code vulnerabilities.

open box / abstract code / open-source code

4 best practices to avoid vulnerabilities in open-source code

Open-source code in public repositories might contain malware or unintentional vulnerabilities. Here's how to best manage finding and mitigating potential problems.

raining data on keyboard programming developer code

What is DevSecOps? Why it's hard to do well

DevSecOps is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives.

coding / programming / development / binary code

Review: How ShiftLeft catches vulnerabilities during code development

This combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

ij1kcay

Set your brand up for success with a .tech domain extension

Imagine this. You’ve finally completed your brand new app that’s going to revolutionize the way we live. You’ve even come up with a catchy name that meshes perfectly with your app and no other company has laid claim to....

ifcr 042 thumb
video

How to code an interactive shiny app to search Twitter: Do More With R bonus video

Learn how to turn code from Episode 41 into an interactive shiny Web app.

youtube thumbnails template
video

AI and machine learning in action

Artificial intelligence and machine learning are being used even more these days. Watch as InfoWorld’s Serdar Yegulalp and IDG TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss how AI and ML are being used and answer viewers’...

Overflow  >  Pouring more binary water into a glass than it can hold causing overflow.

What is a buffer overflow? And how hackers exploit these vulnerabilities

A buffer overflow or overrun is a memory safety issue where a program does not properly check the boundaries of an allocated fixed-length memory buffer and writes more data than it can hold. This causes data to overflow to adjacent...

Digital Transformation [DX]  >  dandelion seeds blown by a virtual wind of change

The state of digital transformation in 2020

The lessons learned from a decade of digital transformation provide a roadmap for those embarking on their own initiatives. CIO, Computerworld, CSO, InfoWorld, and Network World team up to dissect that legacy from every angle.

sale 18294 primary image

This 11-course Microsoft & Oracle SQL certification prep bundle is only $39 today

The Complete Microsoft & Oracle SQL Certification Bundle features 11 courses on how to become a skilled database

Load More