Security
Articles
How to Talk about Security Testing without Scaring People When it came to security testing, Sylvia Killinen noted that her company's most frequent difficulty wasn't the testing itself. Instead, it was the communication that provided problems, in part because of the words used to explain what would be performed. If you take care with how you describe your process, you may get more support while executing tests and repairing systems. |
||
The Star Wars Death Star—from a Tester’s Perspective In the movie Star Wars: Episode IV—A New Hope, the Death Star was designed to be the perfect weapon, with enough firepower to destroy a thousand star systems. Yet a small, ragtag group was able to blow it up. If only Emperor Palpatine had consulted with testers, all of the Death Star’s vulnerabilities could have been found and addressed! |
||
Book Review: Software Test Attacks to Break Mobile and Embedded Devices Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. |
||
How to Incorporate Data Analytics into Your Software Process Big data isn’t just a buzzword; it lives in your software. With millions of possibilities to leverage analytics, how do you pick what’s right for your organization? Robert Cross provides some insight into how to start incorporating data analytics into your software process and management plan. |
||
Cyber Security Test Warriors: Where Might You Take Your Career? Do you know the latest in test attacks and testing techniques to become a cyber security test warrior? Becoming one is probably not for everyone, but the need is real, continues to grow, and offers a career opportunity for those brave enough to take the challenge. |
||
Securing the Trusted Application Base Corporations, government agencies, and other institutions need to embrace industry best practices that have been proven to help develop and implement reliable systems. One of the most important considerations is the need for a secure, trusted application base. This article will help you get started delivering systems that can be verified and supported while continuously being updated as needed. |
||
Why Software Development Companies Will Migrate Toward Cloud-Hosting Solutions Uday Kumar examines some of the key drivers for software development companies marching toward cloud-hosting solutions. Change is the only constant. While technologies will keep evolving to help us overcome challenges, there, of course, will be new and emerging challenges. |
||
The Importance of Software Safety Software impacts our world in many important ways. Almost everything that we touch, from the beginning to the end of our day, relies upon software. Bob Aiello explains the importance of software safety for configuration managers. Remember, software safety requires that systems be built and configured in a secure and reliable way. |
||
Mobile Challenges for Project Management: The Human Factors Continuing the conversation on building software for mobile devices, we look beyond the devices to the human concerns and challenges of managing a mobile-app development team, including ergonomics, health, and scheduling. |
||
Harden Your Web Applications with Practical Security Testing Even though software security is vital, security testing principles and practices take time for functional testers to master. The good news is that getting started doesn't have to cost a fortune, as there are effective freeware tools out there. Scott Aziz offers practical techniques that will help you get started. |
Pages
Recommended Web Seminars
On Demand | Building Confidence in Your Automation |
On Demand | Leveraging Open Source Tools for DevSecOps |
On Demand | Five Reasons Why Agile Isn't Working |
On Demand | Building a Stellar Team |
On Demand | Agile Transformation Best Practices |