Related Content
Security Testing and Assessing Risk: A Slack Takeover with Shachar Schiff Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. Shachar Schiff, founder and principal consultant at BadTesting, hosted this Slack takeover and discussed assessing code coverage like a risk analyst, risk assessments outside security, and more. |
||
Getting Support for the Tests You Need Done It’s often hard for teams to get sufficient time and resources for the amount and quality of tests they think are needed. It’s like management wants testing done but at the same time doesn’t want to commit what’s needed to do it. If that's your case, look at the business side, rank priorities, and negotiate resources. |
||
Security Tips for App Development When companies develop applications they consider competitors and the market, but the most important aspect is cybersecurity. Developers need to release apps that don’t put consumers or their data in danger. Here are five tips that app developers should keep in mind to create and maintain the most secure apps possible. |
||
Are You Forgetting a Stakeholder? Technology allows amazing innovations to optimize business and deliver new and better services, but if you don’t carefully consider your entire user community, innovations may cost you business. When designing for stakeholders, don't stop at the obvious cases—or else you may find that you forgot an important customer. |
||
Are Your Fundamentals Malfunctioning? Every objective has certain elements that are fundamental to its success. These include the supporting tasks or systems that we take for granted but without which our “real” work could not get done. In order for any organization or team to meet its primary objectives, these fundamentals need to be functioning properly. |
||
Deception and Estimation: How We Fool Ourselves Research suggests that humans are biased, not-very-rational decision-makers. We believe we see things clearly when the evidence shows otherwise. Throw in a big dose of optimism, and it's easy to see how estimating software projects can be problematic. Our best hope is to construct diverse groups with varied viewpoints. |
||
Lower Risk of Downtime by Testing with Production Traffic Teams need a means of identifying potential bugs and security concerns prior to release—with speed and precision, and without the need to roll back or stage. By simultaneously running live user traffic against the current software version and the proposed upgrade, you can detect bugs while reducing risk and downtime. |
||
The Importance of Data Encryption in Cybersecurity Encryption protects private data with unique codes that scramble the data and make it impossible for intruders to read. Despite a data breach, encryption ensures that an institution’s private data is safe, even when attackers get past the firewall. Here are four reasons to use data encryption cybersecurity measures. |