Related Content
3 Essential Components to Building a Security Testing Practice Most mobile app development teams lack a security testing practice, or if they do have one, it lacks the maturity to be effective. But the great security practices are not necessarily those that spend the most money or have the most engineers. It’s the ones that have adopted these three fundamental concepts. |
||
Why Integration Testing Is Crucial for Mobile Apps When customers use a mobile app you built, they expect seamless integration. Performing integration testing is essential due to the need to sync these apps with all the other devices and interfaces. With so many products in the mobile and IoT ecosystems, it is important for testers to think like their users. |
||
Mobile and IoT Challenges: What Testers Need to Know to Improve Their Careers Many of the skills and knowledge areas that testers have in the IT, web, PC, and even mobile world will have application in the IoT. However, there are some knowledge domains that may be new or have some twists, and if testers understand them, they will be able to separate themselves from other job seekers. |
||
Are Your Passwords on This List? Some things never change and, unfortunately, picking bad passwords that put you at risk of identity theft seems to be among them. The 2016 Worst Passwords List has been released by SplashData, the password management company that releases the annual list of the worst of the worst passwords. |
||
Testing the Security of the Internet of Things The Internet of Things (IoT) has made it on many of the trends lists for the year. Given that security issues can make or break market acceptance for IoT solutions, security testing as a quality attribute is expected to gain a lot of prominence in app development again this year. |
||
IoT and Security: The FTC Will Pay $25,000 for Your Solution With the goal of making IoT devices more secure, the U.S. Federal Trade Commission has announced the IoT Home Inspector Challenge. The contest calls for a technical solution or tool that consumers can deploy to guard against security vulnerabilities in software on the IoT devices in their homes. |
||
Understanding the Risks of IoT and Embedded Devices We’ve become so advanced in our technology—especially when it comes to IoT and embedded devices—that we can benefit some people’s quality of life, but one of the big concerns (especially when it comes to a heart) is security and preventing people from misusing access to pacemakers. |
||
Managing the Risks of Cloud Storage When managing and storing information, the cloud is a reasonable place to do that, but you need to realize that, as with a personal computer or any other device, it needs to have a backup (or more than one, for important things). Luckily, there are several ways to make local backup copies of critical data. |