Security

Articles

The Growing Role of AI in DevOps

All around us, we are seeing a growing trend of artificial intelligence (AI) being implemented in every aspect of our lives—from self-driving cars to intelligent chatbots. But what about the world of DevOps? Has AI come to play a role here as well? The growing role of AI in DevOps has unearthed some key benefits it can bring to many DevOps workflows.

Jenelle Fulton-Brown's picture Jenelle Fulton-Brown
laptop What Are the Uses for a Vulnerability Scanner?

Today's hyper-connected world calls for extreme vigilance and knowledge of the ever-present threat of cyberattacks. These cyberattacks typically exploit vulnerabilities to breach your networks. What better way to prevent these attacks than to conduct regular vulnerability scans?

Jordan MacAvoy's picture Jordan MacAvoy
Hacker Why Security Vulnerability Assessments Are Necessary

The growing menace of cybercrime has necessitated vulnerability assessments and testing. They help organizations understand their security flaws and work toward mitigating them.

Akshaya Choudhary's picture Akshaya Choudhary
Secure padlock Embedding Security in a DevOps World

Faster DevOps processes also create new challenges. It was difficult enough to add security into a traditional waterfall software development lifecycle with monthly or quarterly releases, but now software updates are released several times a day! What can developers do to build and maintain more secure applications? Here are some ways to encourage better security practices throughout the DevOps lifecycle.

Alex Humphrey's picture Alex Humphrey
Cursor hovering over the word "Security" on a computer screen Integrating Security and Testing Practices

QA and information security use different methods to approach the same goals. When both groups work together, they can make a greater impact on the security of our products. Here's how the QA team can collaborate with infosec to implement strong security standards, prioritize what to test, and obtain quicker feedback on processes, ultimately seeing fewer production incidents related to security.

Sylvia Killinen's picture Sylvia Killinen
Image of lock over code DevSecOps: Incorporate Security into DevOps to Reduce Software Risk

DevSecOps is a growing movement to incorporate security into DevOps practices in order to ensure flaws and weaknesses are exposed early on through monitoring, assessment, and analysis, so remediation can be implemented far earlier than traditional efforts. By failing fast with security testing, organizations reduce risk of a security incident and decrease the cost of rework.

Alan Crouch's picture Alan Crouch
Tweezers plucking a password out of code Conducting Security Testing for Web Applications

As cyber attacks continue to create panic, the threat to our applications and data in the digital sphere grows stronger. Enterprises in the connected world need to realize that security testing is essential for their web applications. They need modern, all-inclusive security testing plans from the inception of their projects to ensure a secure user experience. Here's how to get started.

Ketan Sirigiri's picture Ketan Sirigiri
A touchscreen with connected IoT devices IoT Security Should Start with the UI Setup

IoT security is a large and changing topic, but there is one basic starting point where device security can be improved during development and testing: the user interface. The UI should be the first line of defense, but it’s currently weak in most IoT devices. Implementing better practices during the initial UI setup will go a long way toward improving security.

Jon Hagar's picture Jon Hagar
Volkwagen car emissions What IoT and Embedded Device Testers Can Learn from the Volkswagen Emissions Scandal

In 2015, it was discovered that Volkswagen had equipped millions of its cars with software to cheat on diesel emissions tests. It was a team of independent testers that uncovered the fraud. Jon Hagar tells testers what they can take away from the scandal and gives some recommendations to consider in order to improve the test industry for IoT and embedded systems.

Jon Hagar's picture Jon Hagar
Data security Test Data Privacy: Start Now to Comply with New Regulations

The key for test data privacy is fulfilling testers’ needs for efficiency, speed, and the most accurate representations of data and application behavior in the production environment, while ensuring privacy and protecting testers from unintentional hazards. Here are some tips for getting started on a test data privacy project to comply with the EU’s coming General Data Protection Regulation.

Marcin Grabinski's picture Marcin Grabinski

Pages

StickyMinds is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.