Security

Conference Presentations

Agile DevOps The T-Shaped Scrum Team: Get in Shape for Your Future
Slideshow

Today, agile teams are being asked to do more than ever before. The notion of a T-shaped person, created by Tim Brown (CEO of IDEO) in the 1990s, describes a new breed of worker—one who goes beyond the standard, assigned role. Mary Thorn believes that the roles of team members can stretch...

Mary Thorn
Mobile Dev Test Vulnerabilities and Bugs in Mobile Apps with Quick Tours
Slideshow

As mobile devices, tools, operating systems, and web technologies rapidly evolve, testers in this changing domain must quickly adapt their thinking. Testers often struggle to find critical vulnerabilities and bugs in mobile applications due to lack of guidance, experience, and the right...

Raj Subramanian
Mobile Dev Test A New Approach to IoT Safety, Risk, and Vulnerability Analysis
Slideshow

The ugly truth is that the interconnection of devices with IoT systems can lead to failures which result in physical injury, unacceptable risk, or cybersecurity vulnerabilities. Preventing such accidents requires identifying hazards, risks, and security vulnerabilities during development.

Gregory Pope
Mobile Dev Test Building and Testing Secure Mobile Apps
Slideshow

Mobile application development is now a mission-critical component of IT organizations and a big part of the software industry’s landscape. Due to the security threats associated with mobile devices, it is critical we build our apps—from the ground up—to be secure and trustworthy. However...

Alan Crouch
Mobile Dev Test Securing your IoT Implementations
Slideshow

As the Internet of Things is deployed across a wide range of industrial, consumer, and business environments, of special interest and concern is the need to implement IoT solutions with careful attention to security. While many of the challenges in IoT security are similar to the...

Tim Hahn
STARCanada Logo Add Security Testing Tools to Your Delivery Pipeline
Slideshow

Developing a delivery pipeline means more than just adding automated deploys to the development cycle. To be successful, quality testing of all types must be incorporated throughout the process to ensure that problems aren’t slipping through. Those checks must include security, or you risk...

Gene Gotimer
Usability vs. Security: Find the Right Balance in Mobile Apps
Slideshow

Successful mobile apps have two key features: a great user experience and the ability to protect users’ data. Balancing user experience and security—a key aspect of product design and engineering—requires a multidisciplinary approach. According to Levent Gurses, a well-balanced app is...

Levent Gurses
How to Find Vulnerabilities and Bugs in Mobile Applications
Slideshow

As mobile devices, tools, operating systems, and web technologies rapidly evolve, testers must quickly adapt their thinking in this changing domain. Testers often struggle to find important vulnerabilities and bugs in mobile applications due to lack of guidance, experience, and the right...

Raj Subramanian
Agile Dev, Better Software & DevOps Conference West 2015: Tips and Tricks for Building Secure Mobile Apps
Slideshow

Mobile application development is now a mission-critical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built—from the ground up—to be secure. However, many application developers and testers do...

Jeffery Payne, Coveros, Inc.
Harness the Power of Checklists
Slideshow

As testers, we can feel overwhelmed by the sheer volume of things that require our attention. We are pressured to meet the demands of a fast-paced development environment while grappling with the extreme complexities inherent in today’s software. How can we remember everything while...

Kirk Lee, Infusionsoft

Pages

StickyMinds is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.