Related Content
The Ethical Responsibility of Defect Severity Classification When dealing with defect classification, it's important to not blindly adhere to the criteria without consideration for real business or human implications. If your software does safety-critical work, do the defect levels reflect that? Or could something go live with potentially disastrous consequences? |
||
Cyber Threat Predictions for 2016 and Privacy Protection Tips The growing proliferation of digital dust is one of the key findings from the 2016 Emerging Cyber Threats Report issued annually by the Georgia Tech Information Security Center and Research Institute. |
||
Back to School: Cyber Safety Resources Back to school means back to homework, and more and more kids are likely to receive and submit their homework assignments online. Good or bad, today’s kids and their parents depend on the Internet, so laying down some cyber safety ground rules is important. |
||
Software Testing: A Social Responsibility As businesses and consumers embrace big data and analytics, mobile, cloud, the IoT, and other rapidly emerging technologies, the expectation that software "just works" is rising exponentially. Equipping our technical workforce with the best education and training, tools, and approaches is critical. |
||
Reliability Is Possible with Environment Management To have completely reliable systems, we must have effective IT controls in place that help to identify risks before they turn into incidents. Change management meetings are very helpful for coordination. Effective environment management and change control can keep your systems reliable and secure. |
||
The Security Risks of the Internet of Things The Internet of Things is making life easier, but is it making it more secure? If you take into account that hackers can remotely control Chrysler automobiles that are connected to a network, the answer seems to be no. If this is where our world is headed, how should we think about security now? |
||
Ignore the Data at Your Own Risk At work, the evidence of something worth paying attention to is often front and center, and yet we dismiss it. If you ignore the data—negative survey results, team member absences, an increase in bugs, stakeholders who repeatedly miss meetings, etc.—you could be overlooking signs of trouble. |
||
The Potential for DevOps in Fighting Cyber Warfare Government hacking incidents have put cyber warfare in the news. DevOps actually presents an interesting arsenal. With DevOps, your systems have excellent environment monitoring and are cryptographically verifiable such that the slightest penetration or unauthorized change is immediately detected. |