security

Can Bug Bounty Programs Replace In-House Testing?

Large companies have long used bug bounty programs to find vulnerabilities in their software, but these initiatives are becoming increasingly common among individual developers, too. Should a small business use a bug bounty program? And could it even replace their in-house testing? Should it?

Sanjay Zalavadia's picture
Sanjay Zalavadia
Managing Security Testing in Agile Software Development

One of the biggest myths in the world of agile development is that there is not enough time to do security testing. Sanjay Zalavadia shows you the most efficient and cost-effective way of performing security testing in an agile environment: by rolling it into each sprint incrementally, from day one.

Sanjay Zalavadia's picture
Sanjay Zalavadia
Are You a Victim of Ubiquitous Computing?

Ubiquitous computing—anywhere, anytime computing—is on the rise. And while the benefits of anywhere, anytime computing are numerous, there are new and invisible risks that cannot be ignored. Rajini Padmanaban looks at ubiquitous computing and its effect on society.

Rajini  Padmanaban's picture
Rajini Padmanaban
Tim Cook Intensifies Online Privacy Debate

"... (S)ome of the most prominent and successful companies have built their businesses by lulling their customers into complacency about their personal information. They're gobbling up everything they can learn about you and trying to monetize it. We think that's wrong." —Tim Cook, Apple CEO

Anuj Magazine's picture
Anuj Magazine
New Biometric Security with 3D Fingerprint Scans

Researchers at the Berkeley Sensor and Actuator Center are working on a security solution that’s similar to medical ultrasound imaging. The technology is a tiny ultrasonic fingerprint sensor that can measure a 3D image of your finger’s surface, along with a shallow layer of tissue underneath.

Pamela Rentz's picture
Pamela Rentz
The Gap between User Expectations and Reality in the World of Privacy

Online privacy is a largely discussed and debated topic today. There is a common belief that with the advent of social and mobile computing, user privacy is at stake—and the growth in big data has made it worse. Some even say that, with the arrival of the mobile ecosystem, privacy is endangered.

Mukesh Sharma's picture
Mukesh Sharma
How Netflix Handles DevOps, Automation, and Security

With code being deployed thousands of times per day, DevOps is Netflix’s best option. It’s a high-speed approach for a high-speed service in a high-speed industry, but with it comes various security risks. Jason Chan, a cloud security architect, looked to automation to solve any issues.

Josiah Renaudin's picture
Josiah Renaudin
Internet of Things Mailbox Will Further Secure Your Personal Data

The Gate smart mailbox is looking to add a new level of security to your mail, powered by the Internet of Things. This new Kickstarter campaign plans to enhance your basic US mailbox and not only let you know when mail goes in, but also when it’s taken out.

Josiah Renaudin's picture
Josiah Renaudin