Software Development
Software Development | News, how-tos, features, reviews, and videos
This 12-course bundle will teach you how to be an ethical hacker for $39
The A to Z Cyber Security & IT Certification Training Bundle contains 12 courses on how to pinpoint vulnerabilities in network systems and suggest ways to improve.
Set your brand up for success with a .tech domain extension
Imagine this. You’ve finally completed your brand new app that’s going to revolutionize the way we live. You’ve even come up with a catchy name that meshes perfectly with your app and no other company has laid claim to....
3 DevSecOps success stories
Learn how three very different companies — Microsoft, Verizon and the Pokemon Company — got their development and security teams to work together smoothly.
Cloud security: Inside the shared responsibility model
The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem.
Black Hat keynote: Why security culture needs to change
Dino Dai Zovi tells Black Hat audience to embrace a culture where security is everyone's job and risks are shared. Automation with feedback loops also key to solving security challenges at scale
28 DevSecOps tools for baking security into the development process
Catch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools.
How to get started using Ghidra, the free reverse engineering tool
The Ghidra reverse engineering tool is free to download and use and is a worthy alternative to incumbent IDA Pro. Here's what you need to know to get started. (Some assembly required.)
Verizon builds a DevSecOps culture with its developer dashboard
Verizon's developer dashboard not only records how vulnerabilities are introduced and by whom, but provides indicators as to why. The goal isn't to name and shame, but to instill a secure-by-design mindset.
5 open source intrusion detection tools that are too good to ignore
Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options.
The ethics of creating secure software
The permeation of software into every aspect of our lives makes it impossible to avoid. Software has transcended from a technical process into the realm of social morality. Therefore, the consequences are on a massive scale across the...
Secrets of 'shift left' success
The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.
video
How to deliver code faster with CI/CD
This 3-minute video explains how to use continuous integration and continuous development to deliver apps faster and with higher quality
video
R tip: Animations in R
In this eighth episode of Do More with R, learn how to animate data over time with R and the gganimate and ggplot2 packages.
Software products aren’t cookies
Understanding the security of third-party components.
video
JavaScript creator Brendan Eich, on the genesis of the popular programming language | True Technologist Ep 1
In this episode of True Technologist, Brendan Eich, creator of the JavaScript language and cofounder of Mozilla, describes the hectic and challenging early days of bringing JavaScript to market, as well as his new company, Brave...
video
R tip: Create maps in R
In this seventh episode of Do More with R, learn how to create maps in R—it’s easier than you think, thanks to new and updated packages like sf, tmap, and ggplot2
video
The 5 best programming languages for AI development
Here are the top five languages for creating AI-enabled apps, according to InfoWorld contributor and deep learning architect Ian Pointer.
5 tips for getting started with DevSecOps
Don't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.
video
R tip: Iterate with purrr's map_df function
In this sixth episode of Do More with R, learn how to apply a function to a vector of values and return a data frame
4 reasons why CISOs must think like developers to build cybersecurity platforms and stop investing in ‘silver bullets’
The Chief Information Security Officer is the latest addition to the C-suite with funding, staff and authority to ensure the confidentiality, integrity and availability of corporate digital assets. The CISO must quickly shed the...
-
eBook
Sponsored -
White Paper
-
White Paper
-
Video/Webcast
Sponsored -
White Paper