Related Content
Cybersecurity Tips for Project Managers A project manager must be aware of the dangers the software faces if they are to be effective in its defense while managing their project. A lot of the data they're dealing with can be extremely sensitive. Let’s look at some tips that every project manager should pay attention to in order to protect their project. |
||
Continuous Risk Management in Cybersecurity Traditional cybersecurity is reactive. It responds to threats as they surface while trying to minimize the chance they will ever be an issue. Yet in an environment of constant change and evolution, this is insufficient. What your business needs to do is approach cybersecurity from the perspective of continuous risk. |
||
Good Process, Bad Process “Process” is a word that seems to have a lot of baggage. Depending on whom you ask, process is either essential to delivering value, or something that gets in the way. But this is the wrong way to frame the issue. A process is not inherently good or bad; it's how you use it, and whether it's right for your situation. |
||
Does Agile Have Too Many Meetings? Because agile favors lots of short meetings, it may seem like they take up a lot more time. But when you compare it to time spent meeting in the pre-agile days, it's usually actually less. However, this doesn’t mean all meetings you attend are useful. Here are a few tips for deciding if all your meetings are necessary. |
||
Defect Reporting: The Next Steps When a software defect is identified, best practices usually only pertain to the initial writing of the defect, not the tasks required to close it. Many factors can influence the tester's work. The solution is to add a “Next Steps” section that identifies the work remaining and the person responsible for completing it. |
||
Shifting Security Left: The Innovation of DevSecOps The more established a product is when it is first audited for security, the harder it will be to find the time to fix problems and to refactor the software. DevSecOps was created to get application security practices into the development process as early as possible, so we can use them from the beginning of a project. |
||
How Blockchain Technology Will Disrupt Business The security factor has made blockchain popular in finance applications—indeed, it's probably known best as the record-keeping technology behind bitcoin. But there’s more to its prospects than finance. Blockchain stands to be a disruptor in the business world because it has potential applications in so many fields. |
||
3 Tactics to Stay Productive with an Agile Schedule The usual productivity tips apply best to those working in a typical office with typical hours. What if you don’t work within a structured schedule? How can you stay productive when work ebbs and flows or occurs outside the typical nine-to-five? Here are three ways to be productive when your schedule is unpredictable. |