Related Content
Google: How Online Accounts Are Hijacked Hijacking accounts is one of the top online security threats, with billions of usernames and passwords from different platforms available on black markets. To understand how hijackers steal passwords and other sensitive data, Google partnered with UC Berkeley in a study of Google accounts. |
||
4 Cyber-Security Actions to Protect from Attacks With breaches and computer hacks, companies constantly need to keep information safe. If there are loopholes in your security process, you are putting your product—and customers—at risk. Here are four actions every security-conscious company and individual should implement to avoid becoming a victim of cyber attacks. |
||
Insider Threats: What’s the Biggest IT Security Risk in Your Organization? Any modern company should give the line-of-business teams the ability to provision self-service, on-demand resources, but to ensure security, you have to do so in a way that has the necessary monitoring built in via automation. One good way is to use a cloud management platform that helps you keep your app secure. |
||
Breaking the Cycle of Bad Scrum When practiced well, Scrum can empower people, teams, and organizations to solve complex problems and deliver value to their customers. But bad Scrum does the opposite. If team members or leaders don't embrace Scrum values, it can be oppressive and create tension. Here's how you can prevent bad Scrum from taking hold. |
||
Why Frequently Delivering Working Software Is Crucial to Agile While completing documentation is often an indication that some progress has been made, until software has been implemented, tested, and approved by a customer, the amount of progress cannot be measured. Here are some common reasons agile teams fail to frequently deliver working software—and how to avoid them. |
||
6 Major Challenges of Cloud Computing Companies of all sizes depend on cloud computing to store important data. However, significant factors such as cost, reliability, and security must not be overlooked. Here are six common challenges you should consider—and develop plans to mitigate—before implementing cloud computing technology. |
||
What’s in the Fall 2017 Issue of Better Software Magazine Better Software magazine editor Ken Whitaker highlights content from the latest issue, including articles on bridging the divide between agile and waterfall, scaling agile through empowered teams, DevOps and IoT, and continuous development. |
||
Use Continuous Backlog Grooming to Refine Agile Requirements Continuous backlog grooming means systematically refining your user stories: breaking up larger stories, obtaining detailed requirements, writing the requirements in terms of acceptance criteria and acceptance tests, and sharing and refining these details with the team. Acceptance test-driven development can help. |