Software Development

Software Development | News, how-tos, features, reviews, and videos

sale 20230 primary image wide

This 12-course bundle will teach you how to be an ethical hacker for $39

The A to Z Cyber Security & IT Certification Training Bundle contains 12 courses on how to pinpoint vulnerabilities in network systems and suggest ways to improve.

ij1kcay

Set your brand up for success with a .tech domain extension

Imagine this. You’ve finally completed your brand new app that’s going to revolutionize the way we live. You’ve even come up with a catchy name that meshes perfectly with your app and no other company has laid claim to....

teamwork / collaboration / developers / development / engineers / binary code / virtual interface

3 DevSecOps success stories

Learn how three very different companies — Microsoft, Verizon and the Pokemon Company — got their development and security teams to work together smoothly.

Cloud Security

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem.

teamwork collaboration / leadership / development / developers / abstract data

Black Hat keynote: Why security culture needs to change

Dino Dai Zovi tells Black Hat audience to embrace a culture where security is everyone's job and risks are shared. Automation with feedback loops also key to solving security challenges at scale

hackathon students code programmer devops certification by rawpixel unsplash

28 DevSecOps tools for baking security into the development process

Catch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools.

clock gear accuracy machine engineer

How to get started using Ghidra, the free reverse engineering tool

The Ghidra reverse engineering tool is free to download and use and is a worthy alternative to incumbent IDA Pro. Here's what you need to know to get started. (Some assembly required.)

Define your organization's culture

Verizon builds a DevSecOps culture with its developer dashboard

Verizon's developer dashboard not only records how vulnerabilities are introduced and by whom, but provides indicators as to why. The goal isn't to name and shame, but to instill a secure-by-design mindset.

detective with magnifying glass

5 open source intrusion detection tools that are too good to ignore

Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options.

ethics typewriter keys values morals

The ethics of creating secure software

The permeation of software into every aspect of our lives makes it impossible to avoid. Software has transcended from a technical process into the realm of social morality. Therefore, the consequences are on a massive scale across the...

two tiny figures study dashed lines with arrows indicating different directions or paths

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.

iwan 006
video

How to deliver code faster with CI/CD

This 3-minute video explains how to use continuous integration and continuous development to deliver apps faster and with higher quality

template c100.00 00 42 21.still001
video

R tip: Animations in R

In this eighth episode of Do More with R, learn how to animate data over time with R and the gganimate and ggplot2 packages.

security audit - risk assessment - network analysis

Software products aren’t cookies

Understanding the security of third-party components.

template c100.00 03 27 12.still001
video

JavaScript creator Brendan Eich, on the genesis of the popular programming language | True Technologist Ep 1

In this episode of True Technologist, Brendan Eich, creator of the JavaScript language and cofounder of Mozilla, describes the hectic and challenging early days of bringing JavaScript to market, as well as his new company, Brave...

template c100.00 04 55 16.still001
video

R tip: Create maps in R

In this seventh episode of Do More with R, learn how to create maps in R—it’s easier than you think, thanks to new and updated packages like sf, tmap, and ggplot2

ai video cover
video

The 5 best programming languages for AI development

Here are the top five languages for creating AI-enabled apps, according to InfoWorld contributor and deep learning architect Ian Pointer.

runners at starting line

5 tips for getting started with DevSecOps

Don't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.

template c100.00 01 43 18.still001
video

R tip: Iterate with purrr's map_df function

In this sixth episode of Do More with R, learn how to apply a function to a vector of values and return a data frame

number 4 four with binary grunge background

4 reasons why CISOs must think like developers to build cybersecurity platforms and stop investing in ‘silver bullets’

The Chief Information Security Officer is the latest addition to the C-suite with funding, staff and authority to ensure the confidentiality, integrity and availability of corporate digital assets. The CISO must quickly shed the...

Load More