security

The Ethical Responsibility of Defect Severity Classification

When dealing with defect classification, it's important to not blindly adhere to the criteria without consideration for real business or human implications. If your software does safety-critical work, do the defect levels reflect that? Or could something go live with potentially disastrous consequences?

Payson Hall's picture
Payson Hall
Cyber Threat Predictions for 2016 and Privacy Protection Tips

The growing proliferation of digital dust is one of the key findings from the 2016 Emerging Cyber Threats Report issued annually by the Georgia Tech Information Security Center and Research Institute.

Pamela Rentz's picture
Pamela Rentz
Back to School: Cyber Safety Resources

Back to school means back to homework, and more and more kids are likely to receive and submit their homework assignments online. Good or bad, today’s kids and their parents depend on the Internet, so laying down some cyber safety ground rules is important.

Pamela Rentz's picture
Pamela Rentz
Software Testing: A Social Responsibility

As businesses and consumers embrace big data and analytics, mobile, cloud, the IoT, and other rapidly emerging technologies, the expectation that software "just works" is rising exponentially. Equipping our technical workforce with the best education and training, tools, and approaches is critical.

Michael Sowers's picture
Michael Sowers
Reliability Is Possible with Environment Management

To have completely reliable systems, we must have effective IT controls in place that help to identify risks before they turn into incidents. Change management meetings are very helpful for coordination. Effective environment management and change control can keep your systems reliable and secure.

Bob Aiello's picture
Bob Aiello
The Security Risks of the Internet of Things

The Internet of Things is making life easier, but is it making it more secure? If you take into account that hackers can remotely control Chrysler automobiles that are connected to a network, the answer seems to be no. If this is where our world is headed, how should we think about security now?

Josiah Renaudin's picture
Josiah Renaudin
The Potential for DevOps in Fighting Cyber Warfare

Government hacking incidents have put cyber warfare in the news. DevOps actually presents an interesting arsenal. With DevOps, your systems have excellent environment monitoring and are cryptographically verifiable such that the slightest penetration or unauthorized change is immediately detected.

Bob Aiello's picture
Bob Aiello
DevOps Can Be Secure and Agile at the Same Time

When it comes to DevOps, the goal is to move applications from development, to test, and then eventually to deployment as quickly and efficiently as possible. However, you can still be agile while having a safe, properly security-tested DevOps environment.

Josiah Renaudin's picture
Josiah Renaudin