security

Person holding up a picture of a cloud What the Future Holds for Cloud Computing

Thanks to the development of cloud architecture away from a server-client pattern, those in the software industry will be able to embrace heterogenous cloud services that can only run when needed. Consequently, we are due for a cloud renaissance. Here are some predictions for what the future holds for cloud computing.

Anabel Cooper's picture
Anabel Cooper
security software Why the Burden of Security Should Be Assumed by the Entire Team

Quality can be improved over time, and while it’s difficult to change perception, it’s still possible. But poor security can sink your ship before it even leaves the dock. Invest in the security of your application and be sure to spread that responsibility to multiple levels of your software team.

Josiah Renaudin's picture
Josiah Renaudin
hacker using computer Security Testers Should Think like Hackers

It is a common belief that testers should think like end-users by going beyond the defined requirements, seeing if the application under test addresses end-user expectations, and evaluating how it fares against competition. But with security testing, testers have to think not only like end-users, but also like hackers.

Rajini  Padmanaban's picture
Rajini Padmanaban
lock and keys Security Is Critical, So Why Don’t We Take It Seriously?

Once you move into banking applications or anything related to healthcare, it becomes more and more important for developers and testers to guarantee that all the data they’re gathering from their users is locked behind the biggest, most bulletproof safe you’ve ever seen.

Josiah Renaudin's picture
Josiah Renaudin
password written on sticky note What Are the Worst Passwords of 2017?

The more things change, the more they stay the same. For the fourth straight year, the top spots in the annual worst passwords of the year list issued by password management company SplashData are unchanged. People apparently still use “123456” and “password.”

Pamela Rentz's picture
Pamela Rentz
pink lady slipper flowers Growing Security Intelligence: DARPA Proposes Plants as Sensors

The new Advanced Plant Technologies program established by DARPA, the Defense Advanced Research Projects Agency, will explore ways to use plants' natural responsiveness to their environment as a military sensor to detect and report on the presence of threats such as explosive devices or radioactivity.

Pamela Rentz's picture
Pamela Rentz
magnifying glass looking at code Google: How Online Accounts Are Hijacked

Hijacking accounts is one of the top online security threats, with billions of usernames and passwords from different platforms available on black markets. To understand how hijackers steal passwords and other sensitive data, Google partnered with UC Berkeley in a study of Google accounts.

Pamela Rentz's picture
Pamela Rentz
Cyber security 4 Cyber-Security Actions to Protect from Attacks

With breaches and computer hacks, companies constantly need to keep information safe. If there are loopholes in your security process, you are putting your product—and customers—at risk. Here are four actions every security-conscious company and individual should implement to avoid becoming a victim of cyber attacks.

Ray Parker's picture
Ray Parker