security

Broken pastel sticks Security Testing: A Constructive Mindset with a Destructive Approach

A typical tester mimics end-users, who are constructive when exploring an application’s functionality. But the role of a security tester is different. Their focus is mainly on mimicking hackers, who are intentionally destructive. A solid security strategy should balance both constructive and destructive efforts.

Rajini  Padmanaban's picture
Rajini Padmanaban
SecOps team member touching a security icon on a screen 5 SecOps Challenges and How to Overcome Them

SecOps, or security operations, is a collaboration between information security and IT operations to keep a company’s data secure and reduce risk, all while maintaining agile timelines. But it can be difficult to start. Here are five challenges you should address to ensure your SecOps implementation is successful.

Gilad David Maayan's picture
Gilad David Maayan
Shachar Schiff Security Testing and Assessing Risk: A Slack Takeover with Shachar Schiff

Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. Shachar Schiff, founder and principal consultant at BadTesting, hosted this Slack takeover and discussed assessing code coverage like a risk analyst, risk assessments outside security, and more.

Kelly McGee's picture
Kelly McGee
Person holding a smartphone showing mobile apps Security Tips for App Development

When companies develop applications they consider competitors and the market, but the most important aspect is cybersecurity. Developers need to release apps that don’t put consumers or their data in danger. Here are five tips that app developers should keep in mind to create and maintain the most secure apps possible.

Aimee Laurence's picture
Aimee Laurence
Encrypted data on a screen The Importance of Data Encryption in Cybersecurity

Encryption protects private data with unique codes that scramble the data and make it impossible for intruders to read. Despite a data breach, encryption ensures that an institution’s private data is safe, even when attackers get past the firewall. Here are four reasons to use data encryption cybersecurity measures.

Dylan Menders's picture
Dylan Menders
Stacy Kirk DevOps Transformations for QA Teams: A Slack Takeover with Stacy Kirk

Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. QA architect an agile coach Stacy Kirk, founder of QualityWorks Consulting Group LLC and nodeqa.io, hosted this Slack takeover and discussed improving teams by implementing DevOps practices.

Kelly McGee's picture
Kelly McGee
Signposts saying "Myth" and "Fact" Debunking 4 Myths of DevSecOps Adoption

DevSecOps means more secure applications through greater collaboration. However, many organizations hold preconceived notions and misconceptions about what DevSecOps is and why their organizations will face challenges in adopting it. Here are four common myths about DevSecOps transformation, along with the truth.

Alan Crouch's picture
Alan Crouch
Tester holding black Android smartphone Detecting and Preventing Android Security Risks

Even though the Android app development process involves thorough verification, there has been no preventing new malware from being developed. Here are some of the most common potential security risks Android users should watch out for, as well as some measures to take to protect your smartphone, data, and privacy.

Harshal Shah's picture
Harshal Shah