Articles by Dice Staff
-
Secure-by-Design: Why Every Software Developer Needs to Focus on It
The supply chain attack that targeted SolarWinds and customers of the company’s Orion networking monitoring platform, which first came to light in December 2020, prompted a good deal of discussio… -
Python Programming Language: Guides, Tutorials, and Downloads
Python is a robust programming language, widely used by many large organizations that prize its versatility. It’s utilized at Netflix, Dropbox and Google; it’s big in finance; and it's regularly… -
What the Hybrid Workforce Means for Cybersecurity Teams
A little over a year ago, enterprises large and small rushed their employees into remote work as COVID-19 morphed into a full-blown pandemic. Now, a little past the one-year anniversary of the wo… -
How Candidate Profile and IntelliSearch Jobs Help Target Your Job Search
With every passing month, activity on the web is driven increasingly by relevance. Simply put, users don’t have time for an app or service that doesn’t serve up results tailored to their profile… -
Microsoft Exchange Attacks: What IT and Security Need to Know
With the IT and security industries still coming to grips with the sophisticated supply chain attacks that targeted SolarWinds and that company’s customers, Microsoft dropped another bombshell ea… -
5 Big Cybersecurity Changes Since Remote Work Started
On March 11, 2020, the world changed for good. That’s the day that the World Health Organization declared COVID-19 a global pandemic—one that would eventually go on to claim more than 2.6 million… -
Why Cybercriminals Still Look for Skilled Developers on Darknet Sites
Over the past several months, the darknet has undergone a series of changes that reflect a shakeup of the underground cybercriminal economy. In one case, Joker’s Stash, one of the largest and mos… -
Why DDoS Attacks Are Thriving in the Work-From-Home Era
After the COVID-19 pandemic forced organizations to send employees and workers into remote offices, cybercriminals and fraudsters began adjusting their tactics to take advantage of vulnerable dev… -
Make Accessibility a Priority When Developing Software
Developers and engineers always need to take accessibility into account when building software. Unfortunately, accessibility features are sometimes cast by the wayside during a crunchy production… -
Data Breach Costs: Calculating the Losses for Security and IT Pros
With all the cyber threats that made headlines over the past 12 months, there’s one piece of good news that flew under the radar: The average cost of a data breach dipped slightly between 2019 an…