Project Management
Articles
![]() |
What Are the Uses for a Vulnerability Scanner? Today's hyper-connected world calls for extreme vigilance and knowledge of the ever-present threat of cyberattacks. These cyberattacks typically exploit vulnerabilities to breach your networks. What better way to prevent these attacks than to conduct regular vulnerability scans? |
|
![]() |
Choosing the Right Testing Metrics Testing always looks to provide more information in order to have less uncertainty and better control over risk, but that information has to be analyzed carefully.
|
|
![]() |
Most Common QA Myths One of my mentors, whom I admire, once told me, "Quality is not only QA's responsibility; everyone- from development engineers to technical architects, to product managers need to share the responsibilities. In a QA role, if you want to be successful, you have to know the right amount of information from everyone and always ask questions." I took my mentor's advice very seriously. |
|
![]() |
5 Steps to Getting Started with Risk-Based Testing Risk-based testing is an approach to testing that helps us handle our limited resources. It’s also a valid model for years to come because it focuses testing resources where they can have the most impact—regardless of whether limitations are due to budget, tight schedules, or even the uncertainty of an unexpected situation like COVID-19. Here are some practical tips, examples, and steps you can use to adopt risk-based testing. |