Related Content
Protect Your Software through Threat Modeling Many software organizations are overwhelmed with a laundry list of vulnerabilities. They often have no idea where to start, how to determine prioritization, and whether or not those vulnerabilities accurately represent the threats to our applications, users, and data. Threat modeling is a simple yet effective solution. |
||
Better Check This List: Worst Passwords of 2018 We’ve embraced the IoT in our everyday lives, yet with so many connection points, there’s a risky habit too many of us still need to break—using weak passwords. SplashData evaluated more than five million passwords leaked online during the previous year and compiled the top worst passwords for 2018. |
||
3 Myths about Software Project Managers People often have the wrong impression regarding the activities and responsibilities of project managers. You'll hear them say that managing a software project is all about delegating work and keeping the crew in line, but it's more than that. Let's debunk three common, pervasive myths about project managers. |
||
4 Reasons Cybersecurity Is More Important Than Ever Ignoring cybersecurity risks can be disastrous. And as recent hacks and scams have shown, it is not only large organizations or corporations that are being targeted, but also the personal data of everyday people. Here are four reasons cybersecurity is more important than ever, as well as ways you can protect yourself. |
||
FDA’s New Digital Health Report To update health care providers, patients, and developers about some of the risks and benefits surrounding software products, the FDA released a report based on impact to patient safety, health benefits and risks, and best practices. |
||
6 Signs Your Agile Project Isn’t Really Agile There's a trend of organizations declaring they are agile without actually changing how they develop software. Declaring that an apple is an orange doesn’t make it so. These six key indicators can help you determine whether your agile project isn’t really agile after all—and give you some solutions to help. |
||
Up Your Security: Turn On Two-Factor Authentication You may think that if you always take care not to share personal information online and regularly update security settings, turning on two-factor authentication is an unnecessary step. But the truth is there is always a risk. Let's look into how two-factor authentication keeps your personal information more secure. |
||
The Premortem: Planning for Failure While a postmortem, or retrospective, is done after a project is completed, a premortem is done before the project starts as a way to imagine that the project failed and to explore what went wrong. You list every possible thing that can go wrong, then devise solutions to the most probable risks—before you need them. |