|
DevSecOps: Incorporate Security into DevOps to Reduce Software Risk DevSecOps is a growing movement to incorporate security into DevOps practices in order to ensure flaws and weaknesses are exposed early on through monitoring, assessment, and analysis, so remediation can be implemented far earlier than traditional efforts. By failing fast with security testing, organizations reduce risk of a security incident and decrease the cost of rework.
|
|
|
Automated Security Scanning for Your Delivery Pipeline
Slideshow
[video:https://youtu.be/CwZ-F4TUsig width:300 height:200 align:right]
|
Matthew Grasberger
|
|
The T-Shaped Scrum Team: Get in Shape for Your Future
Slideshow
Today, agile teams are being asked to do more than ever before. The notion of a T-shaped person, created by Tim Brown (CEO of IDEO) in the 1990s, describes a new breed of worker—one who goes beyond the standard, assigned role. Mary Thorn believes that the roles of team members can stretch...
|
Mary Thorn
|
|
Vulnerabilities and Bugs in Mobile Apps with Quick Tours
Slideshow
As mobile devices, tools, operating systems, and web technologies rapidly evolve, testers in this changing domain must quickly adapt their thinking. Testers often struggle to find critical vulnerabilities and bugs in mobile applications due to lack of guidance, experience, and the right...
|
Raj Subramanian
|
|
A New Approach to IoT Safety, Risk, and Vulnerability Analysis
Slideshow
The ugly truth is that the interconnection of devices with IoT systems can lead to failures which result in physical injury, unacceptable risk, or cybersecurity vulnerabilities. Preventing such accidents requires identifying hazards, risks, and security vulnerabilities during development.
|
Gregory Pope
|
|
Building and Testing Secure Mobile Apps
Slideshow
Mobile application development is now a mission-critical component of IT organizations and a big part of the software industry’s landscape. Due to the security threats associated with mobile devices, it is critical we build our apps—from the ground up—to be secure and trustworthy. However...
|
Alan Crouch
|
|
Securing your IoT Implementations
Slideshow
As the Internet of Things is deployed across a wide range of industrial, consumer, and business environments, of special interest and concern is the need to implement IoT solutions with careful attention to security. While many of the challenges in IoT security are similar to the...
|
Tim Hahn
|
|
Testing with a DevOps Approach: An Interview with Tom Stiehm
Video
In this interview, Tom Stiehm of Coveros explains how you can integrate test automation with DevOps to create a continuous testing environment. In this performance-driven environment, software development, testing, and operations must evolve to meet iteration and release delivery goals.
|
|
|
What if Someone Steals Your Code? Bob Zeidman, an expert in software forensics, provides a great overview of how to protect your software from predators. You'll learn the difference between copyrights, trade secrets, and patents.
|
|
|
Add Security Testing Tools to Your Delivery Pipeline
Slideshow
Developing a delivery pipeline means more than just adding automated deploys to the development cycle. To be successful, quality testing of all types must be incorporated throughout the process to ensure that problems aren’t slipping through. Those checks must include security, or you risk...
|
Gene Gotimer
|