Related Content
How to Get Security Groups to Join Your DevSecOps Journey DevSecOps shifts security practices left and assures earlier that your application isn't vulnerable to breaches. But convincing a security group to get on board with your DevSecOps journey may not be an easy task. These four points can help you prove to your security group that DevSecOps is in everyone’s best interest. |
||
Choosing a Font for Software with a Global Audience As more businesses are establishing a worldwide presence, our approach to software must consider globalization and localization. So when it comes to designing the user interface for our apps and websites, we must consider good typography. Here's what to take into account when choosing fonts for international products. |
||
The Value of Security Testing in QA For many organizations, traditional testing groups are separated from the IT security group. But having traditional testers perform some security testing efforts is a great way of achieving a balanced approach to shifting left while being mindful of staffing and budgetary challenges. It also has some great advantages. |
||
What’s Next for Virtual Reality? When most of us think of virtual reality, what comes to mind is fitting on a headset to experience a computer-generated simulation of a three-dimensional environment. However, the recent TED conference had a different “shared immersive reality” experience that doesn’t require headgear. Here's what's new with VR tech. |
||
Visual Regression Testing: A Critical Part of a Mobile Testing Strategy Despite our best efforts to replicate customers' behavior in our test automation suites, teams often forget about nonfunctional requirements. An important one is visual perception—how users see and feel each application they use. Visual regression testing can fill a significant gap in user experience expectations. |
||
Continuous Security in Agile Development "Continuous" gets mentioned a lot in agile and DevOps, but one area that often doesn’t get enough attention is how to continuously build, test, and deliver secure applications. Just like for quality, you can’t test security in, so you need to have a plan for how to build it in. Here are some tips on how to do that. |
||
NSA Adds to Open Source Tools and Tech Transfer Program The National Security Agency recently released several of the agency’s software tools as open source and added new technologies to the NSA technology transfer program patent portfolio that are ready for licensing. Could leveraging any of these technologies help your efforts? |
||
Using Contactless Card Technology in Mobile Payments As payment methods have evolved from the traditional cash-based system to mobile systems, contactless cards are becoming more popular for their convenience and flexibility. Here's a primer on how this mobile payment system stores your card information, as well as the near-field communication technology behind it. |