Topic: security

mobile success

From prototypes to wearables: 10 tips for modern mobile success

The concept was similar to other anonymous social media messaging platforms, like Yik Yak, Secret and Whisper. But when Preetham Reddy, lead developer for RezTech LLC in Phoenix, and his team built the Sipper location-based bulletin app, he learned a few hard lessons—as most fledgling app developers do. RezTech’s app experience, while not particularly unique, … continue reading

Apache Storm turns toward security in 2015

Since it was created in 2011, Storm has garnered a lot of attention from the Big Data and stream-processing worlds. In September 2014, the project finally reached top-level status at the Apache Foundation, making 2015 the first full year in which Storm will be considered “enterprise ready.” But that doesn’t mean there’s not still plenty … continue reading

Report: More than 90% of 2014 data breaches could’ve been prevented

More than 90% of data breaches occurring in the first half of 2014 could have been prevented, according to a report from the Online Trust Alliance (OTA). In its 2015 Data Protection Best Practices and Risk Assessment Guidelines, the OTA analyzed more than a thousand personally identifiable information breaches reported by the Open Security Foundation … continue reading

From the Editors: Security is no longer obscurity

If there was one word that could best sum up the software security situation in 2014, it would be “Egad!” With major enterprises like Target, Home Depot and Sony getting not just hacked but completely compromised in 2014, what hope do smaller firms have at keeping the attackers at bay? Fortunately, things are already looking … continue reading

Zeichick’s Take: Big Security, Big Cloud and the Big Goodbye

Software-defined networks and Network Functions Virtualization will redefine enterprise computing and change the dynamics of the cloud. Data thefts and professional hacks will grow, and development teams will shift their focus from adding new features to hardening against attacks. Those are two of my predictions for 2015. Big Security: As 2014 came to a close, … continue reading

The year security was on everyone’s mind

Every year there are a number of vulnerabilities exposed and exploited, but 2014 was bad in terms of software security. In the beginning of the year, Cenzic revealed the latest results from its 2014 Application Vulnerability Trends report and found that a majority of apps have at least one security vulnerability; but it wouldn’t be … continue reading

2014: Into the breach

Software vulnerabilities have existed for as long as there has been software. Organizations and their developers have been locked in a cat-and-mouse game with the legion of hackers looking to steal data. Every time one breach is fixed, another is exploited, and ‘round and ‘round it goes. So, after Julian Assange and WikiLeaks, Edward Snowden, … continue reading

Zeichick’s Take: Innovate in the cloud, cheaply and securely

For development teams, cloud computing is enthralling. Where’s the best place for distributed developers, telecommuters and contractors to reach the code repository? In the cloud. Where do you want the high-performance build servers? At a cloud host, where you can commandeer CPU resources as needed. Storing artifacts? Use cheap cloud storage. Hosting test harness? The … continue reading

Zeichick’s Take: Is the best place for data on-prem or in the cloud? Ask your lawyer

Cloud-based storage is amazing. Simply amazing. That’s especially true when you are talking about data from end users that are accessing your applications via the public Internet. If you store data in your local data center, you have the best control over it. You can place it close to your application servers. You can amortize … continue reading

IDC’s Top 10 technology predictions for 2015

As the year comes to a close, it’s the season of analyst firms looking ahead at the year to come in technology. Not to be confused with Gartner’s Top 10 strategic technology trends for 2015, market intelligence firm IDC has released its own future forecast: “IDC Worldwide Predictions 2015: Accelerating Innovation on the 3rd Platform.” … continue reading

SD Times blog: Surveys show open source makes for faster secure development

One of the things we see a lot of here at SD Times is surveys. It’s a great idea for your company to survey its customers, and the resulting information can be really useful—not just to your company, but to those of us who track the industry and its trends. Thus, I was fairly disturbed … continue reading

Zeichick’s Take: Tomorrow’s forecast: Distributed Denial of Service

Malicious agents can crash a website by implementing a DDoS—a Distributed Denial of Service Attack—against a server. So can sloppy programmers. Take, for example, the National Weather Service’s website, which is operated by the United States National Oceanic and Atmospheric Administration, or NOAA. On August 29, the service went down, hard, as single rogue Android … continue reading

DMCA.com Protection Status