Related Content
What’s Different about Testing Serverless Applications? Serverless computing is a DevOps technique that uses cloud-provided runtimes to execute code components in a defined workflow. Testing is easier in some ways with this model, but more difficult in others. Let's dive into the ways testing serverless applications and components is different from traditional architecture. |
||
Detecting and Preventing Android Security Risks Even though the Android app development process involves thorough verification, there has been no preventing new malware from being developed. Here are some of the most common potential security risks Android users should watch out for, as well as some measures to take to protect your smartphone, data, and privacy. |
||
Building Security into DevOps: A Slack Takeover with Larry Maccherone Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. Larry Maccherone, senior director at Comcast, hosted this Slack takeover and discussed what DevSecOps means, how to get started with security, and the changing role of security specialists. |
||
How to Get Security Groups to Join Your DevSecOps Journey DevSecOps shifts security practices left and assures earlier that your application isn't vulnerable to breaches. But convincing a security group to get on board with your DevSecOps journey may not be an easy task. These four points can help you prove to your security group that DevSecOps is in everyone’s best interest. |
||
The Advantages of Serverless Cloud Providers Most cloud providers have server-based computing services. But that requires servers to be provisioned and administered, and servers have a fixed capacity to operate within. A new DevOps trend is to go serverless—however, this doesn’t mean no servers are used at all. Learn more about this model and its advantages now. |
||
The Value of Security Testing in QA For many organizations, traditional testing groups are separated from the IT security group. But having traditional testers perform some security testing efforts is a great way of achieving a balanced approach to shifting left while being mindful of staffing and budgetary challenges. It also has some great advantages. |
||
Continuous Security in Agile Development "Continuous" gets mentioned a lot in agile and DevOps, but one area that often doesn’t get enough attention is how to continuously build, test, and deliver secure applications. Just like for quality, you can’t test security in, so you need to have a plan for how to build it in. Here are some tips on how to do that. |
||
Integrating Threat Modeling into Agile Development Threat modeling helps you determine where to focus your security testing efforts when building your app. But people often wonder how it can fit into their existing agile software development process. Here are three things you can do to integrate threat modeling into your agile workflow, either early on or mid-project. |