Related Content
Internet of Things Mailbox Will Further Secure Your Personal Data The Gate smart mailbox is looking to add a new level of security to your mail, powered by the Internet of Things. This new Kickstarter campaign plans to enhance your basic US mailbox and not only let you know when mail goes in, but also when it’s taken out. |
||
Why Testers Should Get Involved in Requirements Engineering Testers use requirements as the basis of test cases, review them for testability, and often participate in general requirements reviews or inspections. However, many testers have little knowledge of requirements engineering. Erik van Veenendaal provides five critical success factors to get started. |
||
Stay Ahead of Hackers with Smart Cloud Implementation When moving your business’s IT to the cloud, it’s smart to perform due diligence—for the cloud service provider, but also for your own company's needs, practices, and restrictions. Can all your data go on the cloud? Should more sensitive data remain under your own IT department's control? Read on. |
||
Industrializing Testing Services for SaaS Products Software as a service is a key component today of every enterprise application outsourcing strategy. Smart testing with the right blend of depth and speed is the cornerstone of successfully testing SaaS applications. Reap the benefits of SaaS products by creating an effective, reusable strategy. |
||
Three Ways to Increase Test Coverage Most defects are due to poorly defined requirements and incomplete test coverage, and fixing an error is cheaper at the coding phase than during testing. In order to ensure more thorough testing, try functional workflow documentation, four-dimensional test coverage, and risk-based prioritization. |
||
Mobile App Security Is a Problem, Even for Fortune 500 Companies A recent IBM/Ponemon study shows that mobile application development for a high percentage of large companies—which includes some Fortune 500 members—has significant weaknesses, leaving enterprise data susceptible to theft. These apps just aren’t being properly security tested before release. |
||
Evaluating Your Risks before Moving Data to Cloud Storage When companies move services to the cloud, security concerns don't disappear by transferring management to the cloud service provider. It's smart to familiarize yourself with what security controls the service provider has in place first, and to have ways of auditing those protocols as you proceed. |
||
Let’s Stop the Password Madness People and organizations definitely should take security seriously. That said, some of the “experts” advising about password security are going too far. Frequent password changes give the appearance of more robust security without actually affecting anything. Payson Hall unpacks this requirement. |