Security

Articles

Volkwagen car emissions What IoT and Embedded Device Testers Can Learn from the Volkswagen Emissions Scandal

In 2015, it was discovered that Volkswagen had equipped millions of its cars with software to cheat on diesel emissions tests. It was a team of independent testers that uncovered the fraud. Jon Hagar tells testers what they can take away from the scandal and gives some recommendations to consider in order to improve the test industry for IoT and embedded systems.

Jon Hagar
Data security Test Data Privacy: Start Now to Comply with New Regulations

The key for test data privacy is fulfilling testers’ needs for efficiency, speed, and the most accurate representations of data and application behavior in the production environment, while ensuring privacy and protecting testers from unintentional hazards. Here are some tips for getting started on a test data privacy project to comply with the EU’s coming General Data Protection Regulation.

Marcin Grabinski
lock Using the Principles of the CIA Triad to Implement Software Security

If you're starting or improving a security program for your software, you probably have questions about the requirements that define security. Data need to be complete and trustworthy, and also accessible on demand, but only to the right people. The CIA triad defines three principles—confidentiality, integrity, and availability—that help you focus on the right security priorities.

Sylvia Killinen
Security Testing How to Talk about Security Testing without Scaring People

When it came to security testing, Sylvia Killinen noted that her company's most frequent difficulty wasn't the testing itself. Instead, it was the communication that provided problems, in part because of the words used to explain what would be performed. If you take care with how you describe your process, you may get more support while executing tests and repairing systems.

Sylvia Killinen
Death Star Testing The Star Wars Death Star—from a Tester’s Perspective

In the movie Star Wars: Episode IV—A New Hope, the Death Star was designed to be the perfect weapon, with enough firepower to destroy a thousand star systems. Yet a small, ragtag group was able to blow it up. If only Emperor Palpatine had consulted with testers, all of the Death Star’s vulnerabilities could have been found and addressed!

Michael Mak
Test Attacks to Break Mobile Devices Book Review: Software Test Attacks to Break Mobile and Embedded Devices

Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams.

Michael Sowers
Software Data Analytics How to Incorporate Data Analytics into Your Software Process

Big data isn’t just a buzzword; it lives in your software. With millions of possibilities to leverage analytics, how do you pick what’s right for your organization? Robert Cross provides some insight into how to start incorporating data analytics into your software process and management plan.

Rob Cross
Cyber Security Test Warriors Cyber Security Test Warriors: Where Might You Take Your Career?

Do you know the latest in test attacks and testing techniques to become a cyber security test warrior? Becoming one is probably not for everyone, but the need is real, continues to grow, and offers a career opportunity for those brave enough to take the challenge.

Jon Hagar
Securing the Trusted Application Base Securing the Trusted Application Base

Corporations, government agencies, and other institutions need to embrace industry best practices that have been proven to help develop and implement reliable systems. One of the most important considerations is the need for a secure, trusted application base. This article will help you get started delivering systems that can be verified and supported while continuously being updated as needed.

Bob Aiello
Cloud-Hosting Solutions Why Software Development Companies Will Migrate Toward Cloud-Hosting Solutions

Uday Kumar examines some of the key drivers for software development companies marching toward cloud-hosting solutions. Change is the only constant. While technologies will keep evolving to help us overcome challenges, there, of course, will be new and emerging challenges.

Uday Kumar

Pages

StickyMinds is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.