Related Content
Security Testing Payment Services in the Era of Connected Ecosystems There are many new trends in online payment technology, so the amount of data passing through and stored across varying systems is growing, requiring new standards for how data is captured, stored, used, and destroyed. Testers especially need to consider vulnerabilities related to data privacy and cyber security. |
||
A Conversation about Testing within BDD People using behavior-driven development (BDD) say conversation is the most important part of the process. They use a “given-when-then” format to describe the current state, an action that is supposed to occur, and what results to expect. But if that structure isn't working for your team, don't restrain discussion. |
||
3 More Fundamentals of a Successful Testing Team Many QA managers seek a formula for creating an effective testing team. While they may pursue endless tools and lifecycle approaches, the answer is actually simpler. These three fundamentals will ensure you’re leading your test engineers in the right direction and building a world-class testing organization. |
||
5 Features of a Successful DevSecOps Pipeline When practicing DevOps, how should you include security? What's the best way to build security into an existing continuous integration, continuous delivery, and continuous deployment pipeline? Let’s take a look at five essential features of successful DevSecOps pipelines and analyze where security can benefit most. |
||
Test.ai Raises Funding for Bots to Perform App Testing Startup Test.ai is a system for AI-powered user scenario testing for mobile and web apps that uses bots, not humans, to develop and run test scenarios. It just secured investor funding, so Test.ai is on its way toward its goal of testing every app in the world. CEO Jason Arbon talks about the future of testing and AI. |
||
Measuring the Effectiveness of Your Vulnerability Discovery Strategies Trying to prove an app has no vulnerabilities is fraught with challenges, so teams need to choose appropriate strategies for securing apps and ways of measuring whether the time and money spent searching for vulnerabilities is effective. This means understanding how metrics apply to your specific environment. |
||
DevOps and Security: 5 Principles for DevSecOps With the trend toward a more continuous delivery and deployment process, late-lifecycle activities like security assurance present a significant hurdle to continuously delivering value to customers. DevSecOps addresses this by shifting security assurance activities, personnel, and automation closer to development. |
||
Monarch Butterfly Flight Inspires Micro Air Vehicles Studying the biomechanics of the amazing flight of the monarch butterfly will enhance national security. At least that’s the goal of research about the possibilities of long-range micro air vehicles with enhanced flight efficiency and superior flight range inspired by monarch butterflies. |