Related Content
Measuring the Effectiveness of Your Vulnerability Discovery Strategies Trying to prove an app has no vulnerabilities is fraught with challenges, so teams need to choose appropriate strategies for securing apps and ways of measuring whether the time and money spent searching for vulnerabilities is effective. This means understanding how metrics apply to your specific environment. |
||
The Right Way to Respond to Customer Feedback Due to time constraints and other logistical issues, it’s not always possible to respond to customers about their feedback. But when it is possible, the impact on the customers can be strongly positive if you make your response personal. Here are some things to keep in mind the next time you gather customer feedback. |
||
DevOps and Security: 5 Principles for DevSecOps With the trend toward a more continuous delivery and deployment process, late-lifecycle activities like security assurance present a significant hurdle to continuously delivering value to customers. DevSecOps addresses this by shifting security assurance activities, personnel, and automation closer to development. |
||
Monarch Butterfly Flight Inspires Micro Air Vehicles Studying the biomechanics of the amazing flight of the monarch butterfly will enhance national security. At least that’s the goal of research about the possibilities of long-range micro air vehicles with enhanced flight efficiency and superior flight range inspired by monarch butterflies. |
||
Georgia Tech IoT Study: Takeaways for Smart Cities The internet of things has sky-high expectations, and smart cities, where devices connect across public and private sectors, is one of the drivers fueling the fervor. But there are also skeptics saying the IoT is slow to materialize, which poses questions about risks surrounding cyber security and privacy. |
||
Microsoft Calls for Federal Regulation of Facial Recognition Microsoft has called for federal regulation of facial-recognition software, arguing that such artificial intelligence abilities are too significant and potentially dangerous for its purveyors to police themselves. The move comes amid public criticism of several tech giants over their use—and misuse—of the technology. |
||
5 Myths about API Security APIs are designed to provide interfaces between multiple applications, allowing them to work together. From a security perspective, this is a powerful tool to have. Unfortunately, the effectiveness of APIs diminishes if they are misunderstood. Here are five common myths about API security, along with the facts. |
||
The Risk of Overemphasizing Risks We are trained to identify and evaluate risks. This prevents teams from making decisions that are unlikely to work, saving time and money and helping the team move forward. However, a risk-avoidance mindset can also stop progress. Successful agile teams see risks as ways of starting a conversation, not stopping it. |