CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Software Development
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Software Development

Rear view shot of developer sitting in front of monitors showing Codecov supply chain attack
Cyber SecurityNews

Codecov Supply Chain Attack Remained Undetected For Months and Potentially Affected Major Companies Including Google, IBM, HP, and Others

April 30, 2021
Codecov supply chain attack remained undetected for months and likely affected Google, IBM, HP, and others. Hackers stole user data from the company’s continuous integration environment.
Read More
Developer coding at night showing application security issues
Cyber SecurityNews

Application Security Backsliding, Over 70% of Organizations Say Their Portfolio Is More Vulnerable

March 2, 2021
Ponemon and WhiteSource report on application security indicates that most large enterprise-scale organizations feel that their portfolio of applications has become more vulnerable recently.
Read More
Serious unshaven developer holding laptop showing No Code and Low Code security risks
Cyber SecurityInsights

Why Low Code Shouldn’t Mean High Risk for Businesses

January 6, 2021
No-code and low-code are undoubtedly being touted as the next big thing by the tech industry. Despite all the hype we shouldn’t lose focus on the biggest barrier to adoption: security.
Read More
Source code on display of software developer showing source code leak
Cyber SecurityNews

Disney, Microsoft, and Other Major Companies Affected by Massive Source Code Leak

August 6, 2020
Source code leak of software belonging to over 50 high profile companies was made available online due to misconfiguration of their software development platforms.
Read More
Programming code abstract technology background showing need for balanced development automation
Cyber SecurityInsights

Using a ‘Three Lines of Defense’ Program to Balance Development Stakeholder Needs

August 5, 2020
Development automation needs to shift from an almost exclusively technical automation-for-speed perspective to a more business centric perspective of automation-for-balance.
Read More
Programmer working on computer showing the three barriers to the growth of DevSecOps
Cyber SecurityInsights

Three Barriers to Growth for DevSecOps

May 15, 2020
The use of DevSecOps methodology will enable any software organization to stay ahead of data security while rolling out their products efficiently and quickly.
Read More
Logo of Android on mobile showing the API calls that allow advertisers to view all installed Android apps on a device
Data PrivacyNews

An Obscure API Is Allowing Advertisers to View All Installed Android Apps on a Device

April 16, 2020
API that provides list of Android apps installed on a device may allow advertisers to fingerprint users' demographic information and track what they access on the internet.
Read More
Programmer working on computer showing more hackers making use of software patches to create new vulnerability path
Cyber SecurityInsights

The Irony: Software Patches Have Their Place, But Create New Vulnerability Path

April 7, 2020
With more hackers taking advantage of software patches to find vulnerabilities and attack system, programmers need to focus on securing the code at its foundation and not rely on updates.
Read More
Programmer working on computer showing the cavalier technology approach in the new voting app for Iowa caucus
Cyber SecurityInsights

What the Iowa Caucus Tells Us About Cavalier Approaches to Technology

February 13, 2020
A haphazard technology roll-out of a new voting app led to tech issues that delayed the Iowa caucus results and threw the public into states of confusion and frustration.
Read More
Smartphone with application icons showing the five steps to securing enterprise mobile app
Cyber SecurityInsights

5 Steps to Securing Your Enterprise Mobile App

December 13, 2019
It's important to secure your enterprise mobile app to prevent hackers from exploiting the vulnerabilities. What are the steps to create a more secure app before releasing it to the market?
Read More
Load More

Latest

EU flag on a black keyboard showing EU law for CSAM scanning of encrypted messages

Proposed EU Law Requiring CSAM Scanning Could Put an End To Encrypted Messages

Digital world and data transmission on laptop showing digital transformation and data strategy

DX 2.0 Demands a Sustainable and Secure Data Strategy

Binance mobile app on smartphone screen showing sharing of user data with Russian FSB

Report Says Text Messages Indicate Binance Shared User Data With Russian FSB

Woman in front of modern graphic interface showing data ecosystem and data governance

How the Modern Data Ecosystem Broke Data Governance

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results