Related Content
Security Testing: A Constructive Mindset with a Destructive Approach A typical tester mimics end-users, who are constructive when exploring an application’s functionality. But the role of a security tester is different. Their focus is mainly on mimicking hackers, who are intentionally destructive. A solid security strategy should balance both constructive and destructive efforts. |
||
5 SecOps Challenges and How to Overcome Them SecOps, or security operations, is a collaboration between information security and IT operations to keep a company’s data secure and reduce risk, all while maintaining agile timelines. But it can be difficult to start. Here are five challenges you should address to ensure your SecOps implementation is successful. |
||
Continuous Automation, from Source Code to Production Automation is necessary to achieve the benefits of DevOps principles, so teams may use automation at every step of software development. Depending on how frequently and confidently a team deploys code, they can use automation to enable continuous integration, continuous delivery, and, finally, continuous deployment. |
||
Trusting Your Data: Garbage In, Garbage Out Poor quality input will always produce faulty output. Improper validation of data input can affect more than just security; it can also affect your ability to make effective business decisions. Bad data can have impacts on how you make quantitative decisions or create reports, if you can’t trust the data you receive. |
||
Security Testing and Assessing Risk: A Slack Takeover with Shachar Schiff Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. Shachar Schiff, founder and principal consultant at BadTesting, hosted this Slack takeover and discussed assessing code coverage like a risk analyst, risk assessments outside security, and more. |
||
Rethinking Your Measurement and Metrics for Agile and DevOps In their transition to agile and DevOps, many teams forget they also need to update their measurement and metrics plan. Some measurements and metrics from the traditional waterfall software development lifecycle may remain useful, but many may not provide value—and some may even adversely impact progress toward goals. |
||
Security Tips for App Development When companies develop applications they consider competitors and the market, but the most important aspect is cybersecurity. Developers need to release apps that don’t put consumers or their data in danger. Here are five tips that app developers should keep in mind to create and maintain the most secure apps possible. |
||
Making DevOps Evolution Happen It takes effort to evolve an organization’s culture, processes, and technology to optimize performance for a DevOps environment, and it all comes down to the people. Large-scale mobilization requires a focus on people at all levels, empowering them to discover and make the changes that will help them most. Here's how. |