Related Content
Using Open Source Tools for Security Testing Performing a series of security tests before deployment of your application has become paramount. But that doesn't have to mean a suite of costly tools. Plenty of open source security testing tools have become viable options. Here's why you should consider open source tools for your different types of security testing. |
||
OWASP Releases Latest Top 10 IoT Vulnerabilities The growing list of internet-connected devices bring amazing benefits, but the sharing of valuable information that brings this convenience also brings security concerns. The Open Web Application Security Project has released its Top 10 Internet of Things 2018 list of the highest-priority issues. |
||
Protect Your Software through Threat Modeling Many software organizations are overwhelmed with a laundry list of vulnerabilities. They often have no idea where to start, how to determine prioritization, and whether or not those vulnerabilities accurately represent the threats to our applications, users, and data. Threat modeling is a simple yet effective solution. |
||
Better Check This List: Worst Passwords of 2018 We’ve embraced the IoT in our everyday lives, yet with so many connection points, there’s a risky habit too many of us still need to break—using weak passwords. SplashData evaluated more than five million passwords leaked online during the previous year and compiled the top worst passwords for 2018. |
||
4 Reasons Cybersecurity Is More Important Than Ever Ignoring cybersecurity risks can be disastrous. And as recent hacks and scams have shown, it is not only large organizations or corporations that are being targeted, but also the personal data of everyday people. Here are four reasons cybersecurity is more important than ever, as well as ways you can protect yourself. |
||
Who Should Be Doing Automation Work? Testers often look at automation work as the next career step after manual testing. Automation work has more visibility at the project level, and people who do this work usually also tend to have a little more social status. But Justin Rohrman makes a case for why testers shouldn't be the ones doing automation work. |
||
Up Your Security: Turn On Two-Factor Authentication You may think that if you always take care not to share personal information online and regularly update security settings, turning on two-factor authentication is an unnecessary step. But the truth is there is always a risk. Let's look into how two-factor authentication keeps your personal information more secure. |
||
Top IoT Trends to Expect in 2019 The internet of things is redefining consumer experience, and more companies are investing in it to meet the demands of their clients. It seems like soon, anything that can be connected will be connected. As we look ahead to next year, here are some of the top IoT trends to expect in 2019. |