Related Content
Using Open Source Tools for Security Testing Performing a series of security tests before deployment of your application has become paramount. But that doesn't have to mean a suite of costly tools. Plenty of open source security testing tools have become viable options. Here's why you should consider open source tools for your different types of security testing. |
||
Rebuilding Your Test Strategy If testing is taking awhile and a lot of bugs are getting into production, it's a good idea to review your entire test strategy. Spend some time understanding the current process and what testing is happening through the dev process—not what is outlined in a process wiki, but the work that actually happens. |
||
Solving Problems and Seeking Solutions on an Agile Team While teams are composed of individuals, all of whom solve problems and make decisions, people on consistently successful teams understand that they can be more effective when the focus is on the team, not the individual. Making the best decisions collectively delivers the most value to customers in the long run. |
||
4 Reasons to Use Cloud Testing for Digital Transformation Cloud computing makes data access more reliable and efficient, with less administration effort required, so testing in the cloud can accelerate your digital transformation. This helps guarantee quality and decrease time to market. Here are four more reasons to consider cloud testing for your digital transformation. |
||
Top 10 TechWell Insights Stories of 2018 Many teams are embracing new practices, and several of last year's most-read stories reflect that, with topics such as AI, DevOps, and continuous testing. But it looks like lots of teams also want to get back to basics, because guides to tried-and-true agile and testing methods also ranked high. Check out the roundup. |
||
Protect Your Software through Threat Modeling Many software organizations are overwhelmed with a laundry list of vulnerabilities. They often have no idea where to start, how to determine prioritization, and whether or not those vulnerabilities accurately represent the threats to our applications, users, and data. Threat modeling is a simple yet effective solution. |
||
3 Ideas to Prevent ‘All Talk and No Action’ Meetings When many people are speaking in a meeting but it never translates into meaningful actions later on, it can leave us frustrated. But with some planning and collaboration, we can facilitate ways to make it easier for people to communicate better. Here are three ideas for a little less conversation, a little more action. |
||
Testing the Ethics of AI AI is a double-edged sword. When it's being used in situations involving sensitive personal data, such as health care, banking and finance, and real estate, security is of the utmost importance—and so are ethical implications. It’s up to testers to mitigate risks and make sure AI is used responsibly. |