Software Development
Software Development | News, how-tos, features, reviews, and videos
The CSO guide to top security conferences, 2020
Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.
The future of work: Coming sooner than you think
What will your worklife be like years from now? Today's work-from-home world has given us a glimpse of the future, as these five articles from CIO, Computerworld, CSO, InfoWorld, and Network World illustrate.
Top 10 in-demand cybersecurity skills for 2021
The list of needed security skills is long and growing. Here's what experts say is driving the demand.
How secure are your AI and machine learning projects?
Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.
Using open source for identity projects: 8 considerations
Consider these eight points to decide whether you can securely use open-source code in your identity management projects.
21 best free security tools
Check out these free, standout software tools that will make your daily security work easier.
8 top open source intelligence tools
OSINT (open source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.
The state of application security: What the statistics tell us
Companies are moving toward a DevSecOps approach to application development, but problems remain with security testing ownership and open-source code vulnerabilities.
4 best practices to avoid vulnerabilities in open-source code
Open-source code in public repositories might contain malware or unintentional vulnerabilities. Here's how to best manage finding and mitigating potential problems.
What is DevSecOps? Why it's hard to do well
DevSecOps is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives.
Review: How ShiftLeft catches vulnerabilities during code development
This combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process.
Release the monkey! How Infection Monkey tests network security
This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.
Set your brand up for success with a .tech domain extension
Imagine this. You’ve finally completed your brand new app that’s going to revolutionize the way we live. You’ve even come up with a catchy name that meshes perfectly with your app and no other company has laid claim to....
video
How to code an interactive shiny app to search Twitter: Do More With R bonus video
Learn how to turn code from Episode 41 into an interactive shiny Web app.
video
AI and machine learning in action
Artificial intelligence and machine learning are being used even more these days. Watch as InfoWorld’s Serdar Yegulalp and IDG TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss how AI and ML are being used and answer viewers’...
What is a buffer overflow? And how hackers exploit these vulnerabilities
A buffer overflow or overrun is a memory safety issue where a program does not properly check the boundaries of an allocated fixed-length memory buffer and writes more data than it can hold. This causes data to overflow to adjacent...
The state of digital transformation in 2020
The lessons learned from a decade of digital transformation provide a roadmap for those embarking on their own initiatives. CIO, Computerworld, CSO, InfoWorld, and Network World team up to dissect that legacy from every angle.
This 11-course Microsoft & Oracle SQL certification prep bundle is only $39 today
The Complete Microsoft & Oracle SQL Certification Bundle features 11 courses on how to become a skilled database
-
White Paper
-
eBook
Sponsored -
White Paper
-
White Paper
-
White Paper