We’ll break down how to sign your EXE files to make them more trustworthy for users As a software developer, you likely know the lifecycle of developing software and are well acquainted with the challenges that come with them. This includes everything from errors and…
Blogging About Everything Software Security – Threats, Updates, Best Practices, Tips, & More
Software touches the everyday lives of billions of people around the world. They rely on us (the software industry) to deliver dependable, safe applications for them to use. This blog is dedicated to working together to do our part to make the (software) world a better place…one piece of software at a time!
Do you think that the purpose of hashing is limited to password security? Think again — hashing is much more than that. Discover how, in a world where 82% of breaches involve human elements like errors and misuse,…
Get Your Code Signing Certificate Issued in Just 3 Steps It’s great to see that you’ve decided to get that mandatory trust factor: a code signing certificate, which is needed for signing an application or software package…
Combining your OV code signing certificate and a cryptographic private key is virtually as easy as one, two, and three! Here’s how you can quickly do it using SSL Shopper’s converter tool Code signing certificates enable you…
F4baaa8135e0f9a993f0258a4d095db475096896bd3adb48369f1f70c1f0d9d4. Wondering what that is? It’s the file hash for VLC for Windows. Explore the meaning behind gibberish strings like this that are used by many but known by few In 2021, IBM reports that organizations took an…
Data protection abstract concept vector illustration. Database security software, data protection solution, business information safety, access policy, program development abstract metaphor.
Have you published or downloaded code today? Did you know that 79.1% of the malware samples reported to Spamhaus in October 2022 were infected .exe files? Discover the potential consequences of releasing or downloading unsigned codes. Find out…
In 3Q 2022, IBM’s software segment alone took home $5.8 billion in revenue. Did their focus on marketing contribute to its success? It surely did. Discover 19 breakthrough marketing ideas for software companies that’ll help you propel your business’s…
53% of consumers say they’ll only buy from companies that are known for protecting customers’ data. Discover how to develop, maintain and operate trustworthy web applications. Toughen up your internal and external apps against attacks while balancing…
In 2021, the average public SaaS company had around 36,000 customers. What about your organization? If you’re interested in increasing the number of customers coming through your virtual door, you’ll need to implement powerful lead generation strategies…
Despite the glooming global economic outlook for 2023, Gartner’s gurus are forecasting $195 billion in end-user spending on SaaS. That represents a 16.8% year-over-year growth. Want a slice of the pie? Discover nine unbeatable SaaS marketing tips that’ll help you…
Local file inclusion (LFI), structured query language injection (SQLi), and cross-site scripting (XSS) — these three attack vectors were used in the majority of the 9+ billion web applications and API attacks in the first half of 2022.…
Observing software development best practices is crucial when your project is the next version of an existing application that has thousands or millions of users. You may not be aware that most projects are written using…
Tactics Cybercriminals Use to Hide or Mask Their Identity Cyber predators and cybercriminals aren’t like bad guys in movies and cartoons. They don’t go around on the internet with a flashing sign above them announcing, “I’m…
Digital Identity Helps You Stay Safe on the Web Whenever people think about digital identity in terms of online security, their thought process typically revolves around ways to protect your own digital identity. And that makes…
How to Talk to Your Kids & Teens About Cyber Threats Starting a conversation about internet safety isn’t easy and comes with many challenges. How early should you start talking to them about predators and cyberbullying?…
The “How Tos” of Internet Safety for Kids & Teens Kids and teenagers today are typically thought of as “digital natives.” They were born a decade or two after the modern internet era began with America Online’s monthly…