Related Content
What Testers Need to Know about Security Every single tester should keep an eye on what security vulnerabilities might be plaguing their testing, but speaking in an interview at STARWEST 2016, Jeff Payne, the CEO and founder of Coveros, explained why you need to put a focus on security very early in the process. |
||
Data-Driven Testing Skills in an Agile and DevOps World For agile and DevOps, an understanding of the role of data analysis in the test strategy is helping teams accelerate development, testing, and deployments. As we continue to enhance our testing effectiveness, data analytics skills are an important dimension in managing risks in a “continuous everything” world. |
||
Where Does the Burden of Software Security Lie? Security is continuing to skyrocket in importance as we tie more and more aspects of our personal life to the phones we carry. And with the Internet of Things burrowing deeper and deeper into our daily lives, we need to understand who has access to our info and how we can best protect ourselves. |
||
Make Your Security Testing More Agile Security practices traditionally have followed a waterfall model, adding security testing on at the end. Organizations need to coach their security programs and testers to prioritize analysis and risk, much like we do with agile stories, to better incorporate security defects with other feature work along the way. |
||
Test Your Data Quality to Increase the Return on Your QA Investment With the high volume of data coming into your organization, it’s important that it be complete, correct, and timely. But considering the velocity at which this data is moving, how do you measure its current quality? You must be able to test it wherever it sits still enough to be viewable, without altering it. |
||
Building for the Internet of Things Is Great—Just Keep Security in Mind The Internet of Things gives us opportunities to transform everyday life into frictionless interactions between humans and machines. However, that also means the technological attack surface is everything. Makers learning how to build IoT devices must also learn how to build safe, secure, and compliant devices. |
||
What You Should Consider to Make the Best Use of Your Collected Data We live in a world where data is constantly being recorded. In software, determining the timing of when to use that data is critical to making the most of the information. You should take into account data freshness, the data-gathering processes and any dependencies between them, and when to distribute information. |
||
3 Essential Components to Building a Security Testing Practice Most mobile app development teams lack a security testing practice, or if they do have one, it lacks the maturity to be effective. But the great security practices are not necessarily those that spend the most money or have the most engineers. It’s the ones that have adopted these three fundamental concepts. |