Related Content
Visual Regression Testing: A Critical Part of a Mobile Testing Strategy Despite our best efforts to replicate customers' behavior in our test automation suites, teams often forget about nonfunctional requirements. An important one is visual perception—how users see and feel each application they use. Visual regression testing can fill a significant gap in user experience expectations. |
||
Continuous Security in Agile Development "Continuous" gets mentioned a lot in agile and DevOps, but one area that often doesn’t get enough attention is how to continuously build, test, and deliver secure applications. Just like for quality, you can’t test security in, so you need to have a plan for how to build it in. Here are some tips on how to do that. |
||
NSA Adds to Open Source Tools and Tech Transfer Program The National Security Agency recently released several of the agency’s software tools as open source and added new technologies to the NSA technology transfer program patent portfolio that are ready for licensing. Could leveraging any of these technologies help your efforts? |
||
Using Contactless Card Technology in Mobile Payments As payment methods have evolved from the traditional cash-based system to mobile systems, contactless cards are becoming more popular for their convenience and flexibility. Here's a primer on how this mobile payment system stores your card information, as well as the near-field communication technology behind it. |
||
Explore Inventions throughout History with Google Arts & Culture’s Collection The latest Google Arts & Culture project, Once Upon a Try, is an interactive experience delving into millennia of human inventions and achievements. With more than four hundred collections from CERN, NASA, and over a hundred museums around the world, it’s the largest online exhibition of discoveries ever created. |
||
Integrating Threat Modeling into Agile Development Threat modeling helps you determine where to focus your security testing efforts when building your app. But people often wonder how it can fit into their existing agile software development process. Here are three things you can do to integrate threat modeling into your agile workflow, either early on or mid-project. |
||
Girl Scout Cookie Sales Help Fund STEM Badges, Including Cybersecurity and Programming It's officially Girl Scout cookie season, and that means you’re doing a good thing when you buy those boxes of cookies. The Girl Scouts offer science- and technology-related badges and journeys to introduce girls to computer science, robotics, mechanical engineering, space exploration, and cybersecurity. |
||
Using Open Source Tools for Security Testing Performing a series of security tests before deployment of your application has become paramount. But that doesn't have to mean a suite of costly tools. Plenty of open source security testing tools have become viable options. Here's why you should consider open source tools for your different types of security testing. |