Related Content
OWASP Releases Latest Top 10 IoT Vulnerabilities The growing list of internet-connected devices bring amazing benefits, but the sharing of valuable information that brings this convenience also brings security concerns. The Open Web Application Security Project has released its Top 10 Internet of Things 2018 list of the highest-priority issues. |
||
Top 10 TechWell Insights Stories of 2018 Many teams are embracing new practices, and several of last year's most-read stories reflect that, with topics such as AI, DevOps, and continuous testing. But it looks like lots of teams also want to get back to basics, because guides to tried-and-true agile and testing methods also ranked high. Check out the roundup. |
||
Protect Your Software through Threat Modeling Many software organizations are overwhelmed with a laundry list of vulnerabilities. They often have no idea where to start, how to determine prioritization, and whether or not those vulnerabilities accurately represent the threats to our applications, users, and data. Threat modeling is a simple yet effective solution. |
||
Better Check This List: Worst Passwords of 2018 We’ve embraced the IoT in our everyday lives, yet with so many connection points, there’s a risky habit too many of us still need to break—using weak passwords. SplashData evaluated more than five million passwords leaked online during the previous year and compiled the top worst passwords for 2018. |
||
4 Reasons Cybersecurity Is More Important Than Ever Ignoring cybersecurity risks can be disastrous. And as recent hacks and scams have shown, it is not only large organizations or corporations that are being targeted, but also the personal data of everyday people. Here are four reasons cybersecurity is more important than ever, as well as ways you can protect yourself. |
||
Who Should Be Doing Automation Work? Testers often look at automation work as the next career step after manual testing. Automation work has more visibility at the project level, and people who do this work usually also tend to have a little more social status. But Justin Rohrman makes a case for why testers shouldn't be the ones doing automation work. |
||
Up Your Security: Turn On Two-Factor Authentication You may think that if you always take care not to share personal information online and regularly update security settings, turning on two-factor authentication is an unnecessary step. But the truth is there is always a risk. Let's look into how two-factor authentication keeps your personal information more secure. |
||
2018 Hour of Code: Let’s Dance What kid doesn’t love a dance party? With aliens and sharks that drop, double down, and dab? Introduce kids to the basics of computer science in a way that doesn’t elicit “I’m boooored” with Dance Party, the draw for the 2018 Hour of Code. Do a little dance, make a little code! |