CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Software Development
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Software Development

Software developer typing programming code on computer showing memory-safe languages
Cyber SecurityNews

NSA Urged Software Developers and Operators to Shift to Memory-Safe Languages

November 18, 2022
The NSA urged developers and organizations to switch to memory-safe languages to address memory safety issues responsible for most exploitable vulnerabilities. Microsoft and Google attribute 70% of some of their product vulnerabilities to software memory safety issues.
Read More
Developer coding software on computer showing Kubernetes security policy
Cyber SecurityInsights

Tips for Establishing a Kubernetes Security Policy

November 8, 2022
Kubernetes security directly impacts development work. The agility offered by container orchestration quickly reduces when security challenges impede build and deployment workflows. Any security weaknesses in production environments can – and almost certainly will – lead to data breaches.
Read More
Neon computer keyboard with color backlight showing shadow code and supply chain risk
Cyber SecurityNews

Study Warns That Shadow Code on External JavaScript Libraries Pose a Serious Supply Chain Risk

May 30, 2022
Shadow code may pose a serious supply chain risk. Sampling 4,300 websites and applications ranked by traffic, researchers discovered that each website had an average of 12 third-party scripts and three fourth-party scripts.
Read More
Rear view shot of developer sitting in front of monitors showing Codecov supply chain attack
Cyber SecurityNews

Codecov Supply Chain Attack Remained Undetected For Months and Potentially Affected Major Companies Including Google, IBM, HP, and Others

April 30, 2021
Codecov supply chain attack remained undetected for months and likely affected Google, IBM, HP, and others. Hackers stole user data from the company’s continuous integration environment.
Read More
Developer coding at night showing application security issues
Cyber SecurityNews

Application Security Backsliding, Over 70% of Organizations Say Their Portfolio Is More Vulnerable

March 2, 2021
Ponemon and WhiteSource report on application security indicates that most large enterprise-scale organizations feel that their portfolio of applications has become more vulnerable recently.
Read More
Serious unshaven developer holding laptop showing No Code and Low Code security risks
Cyber SecurityInsights

Why Low Code Shouldn’t Mean High Risk for Businesses

January 6, 2021
No-code and low-code are undoubtedly being touted as the next big thing by the tech industry. Despite all the hype we shouldn’t lose focus on the biggest barrier to adoption: security.
Read More
Source code on display of software developer showing source code leak
Cyber SecurityNews

Disney, Microsoft, and Other Major Companies Affected by Massive Source Code Leak

August 6, 2020
Source code leak of software belonging to over 50 high profile companies was made available online due to misconfiguration of their software development platforms.
Read More
Programming code abstract technology background showing need for balanced development automation
Cyber SecurityInsights

Using a ‘Three Lines of Defense’ Program to Balance Development Stakeholder Needs

August 5, 2020
Development automation needs to shift from an almost exclusively technical automation-for-speed perspective to a more business centric perspective of automation-for-balance.
Read More
Programmer working on computer showing the three barriers to the growth of DevSecOps
Cyber SecurityInsights

Three Barriers to Growth for DevSecOps

May 15, 2020
The use of DevSecOps methodology will enable any software organization to stay ahead of data security while rolling out their products efficiently and quickly.
Read More
Logo of Android on mobile showing the API calls that allow advertisers to view all installed Android apps on a device
Data PrivacyNews

An Obscure API Is Allowing Advertisers to View All Installed Android Apps on a Device

April 16, 2020
API that provides list of Android apps installed on a device may allow advertisers to fingerprint users' demographic information and track what they access on the internet.
Read More
Load More
- Advertisement -
- Advertisement -

Latest

Hacker hands using laptop showing car sharing platform data breach

Car Sharing Platform Zoomcar Hit by a Massive Data Breach, Impacting Approximately 8.4 Million People

Meta logo on device screen showing Meta AI

Meta AI Adds Warning That All Prompts, Including Those With Personal Information, Could be Made Public

Hacker working on keyboard showing cyber attack on whole foods distributor

Amazon’s Whole Foods Distributor United Natural Foods Hit by a Cyber Attack that Disrupted Operations

The White House in Washington DC showing cybersecurity executive order

New Cybersecurity Executive Order Takes on Election Interference Sanctions, Encryption Standards and Disinformation Programs

- Advertisement -
- Advertisement -
- Advertisement -
- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results