CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
  • Showcase
    • OneTrust
  • See all results
Home
Software Development
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Software Development

Image of developer in front of screen writing secure code code
Cyber SecurityNews

Only 1 in 3 Developers Confident They are Writing Secure Code

November 9, 2017
Executives concerned about secure applications but developers are not confident that they are writing secure code or the security of third party modules. Read More
DevOps engineer working with computer on software infrastructure
Cyber SecurityInsights

VMs, Containers and Unikernels? Time to Upgrade Your Software Infrastructure Security

July 19, 2018
Know your VMs from your containers and unikernels in your software infrastructure? Containers may not be as secure as you think and unikernels may offer more speed and security at less cost. Read More
Application icons on mobile phone showing the importance of mobile app security in software development to protect consumer data and privacy
Cyber SecurityInsights

The Most Critical Mobile App Security Tips for Application Development Companies

May 9, 2019
In the competitive world of mobile app development, companies need to take mobile app security as an important factor to protect consumer data and privacy. Read More
Programmer writing software code showing the importance of GDPR compliance in software development
Data ProtectionInsights

All You Should Know about GDPR Acquiescent Software Development

May 16, 2019
GDPR is altering software development practices by forcing software development companies to take steps towards better application design and greater security. Read More
Shopfront of Apple store showing new iOS 13 privacy feature which will close loophole used by VoIP apps
Data PrivacyNews

New iOS 13 Privacy Feature Will Close Loophole Used by VoIP Apps

August 20, 2019
New iOS 13 will limit VoIP apps from running in the background and thus close a loophole that allows third-party apps to exploit background access to collect data on users. Read More
Two businesspersons shaking hands in office showing how to secure open source components so as to make your CSO happy
Cyber SecurityInsights

How to Make Your CSO Happy with Your Open Source Components

August 28, 2019
Open source software components are useful for software development yet vulnerable to attacks due to its openness. What are some of the best security practices in managing them? Read More
Magnifying glass over Facebook web page showing the massive app suspension from Facebook privacy investigation
Data PrivacyNews

Facebook Privacy Investigation Leads to Massive App Suspension Initiative

September 30, 2019
Facebook announced an app suspension of “ten of thousands” of apps as part of its privacy investigation. The initiative extends to any app that refuses to answer Facebook how user data is utilized, shared and monetized. Read More
Privacy text on mobile phone against Facebook logo background showing a Facebook privacy breach which involves developers
Data PrivacyNews

Another Facebook Privacy Breach, This One Involving Developers

November 14, 2019
Another Facebook privacy breach was found through the clean-up of its data privacy practices which involves 100 developers with improper access to Facebook Groups data. Read More
Bug on a computer chip showing the list of top 25 software vulnerabilities released by Department of Homeland Security
Cyber SecurityNews

Department of Homeland Security Updates List of Top 25 Software Vulnerabilities

December 11, 2019
U.S. Department of Homeland Security aims to help software developers and security researchers eliminate common software vulnerabilities by releasing a list of top 25 most dangerous software errors. Read More
Smartphone with application icons showing the five steps to securing enterprise mobile app
Cyber SecurityInsights

5 Steps to Securing Your Enterprise Mobile App

December 13, 2019
It's important to secure your enterprise mobile app to prevent hackers from exploiting the vulnerabilities. What are the steps to create a more secure app before releasing it to the market? Read More

Get Connected

  • 7.9kFans
  • 12.7kFollowers
  •  Followers
  •  Subscribers

Stay Updated

Subscribe to our newsletter.

Thank you for subscribing!

Something went wrong.

We respect your privacy

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Thank you for subscribing!

Something went wrong.

We respect your privacy

Follow us

© 2019 Data Privacy Asia Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
  • Showcase
    • OneTrust
Start typing to see results or hit ESC to close
Regulations U.S. Cyber Threats EU GDPR Data Breach
See all results
Username
Password
Remember Me
Lost password?
Create an account
Enter username or email
Cancel