• Strategies for ensuring embedded software security

    All software developers have ongoing challenges with application security, and embedded software is no exception. What steps can be taken to protect embedded software applications?

  • Do embedded systems require extra security testing?

    While embedded software applications may not necessarily require more security testing than other applications, there are special considerations that developers must keep in mind when working with ...

  • Eliciting requirements for embedded systems

    In this response, expert Sue Burk describes the importance of the relationship between hardware and software in embedded systems, and how they must be able to communicate and collaborate with each ...

  • Eliciting and analyzing embedded systems requirements

    Read this expert response for Sue Burk's suggestions for what techniques developers can use in embedded systems requirements gathering and analysis.

  • Embedded software: Hardware and software functionality

    When testing embedded software, testers must take into account the platform, operating system, hardware and the purpose of the software being tested. Read this expert response, which recommends con...

  • Tools and processes for embedded software testing

    Many people are buzzing about embedded software these days, and this complex technology raises questions about platform, testing and quality. In this expert response, Pete Walen discusses his exper...

  • Making sense of test automation

    Organizations want to take advantage of what automation has to offer, yet it needs to be cost-effective and time-efficient. Read expert Pete Walen's take on a commonly heard recommendation: "Automa...

  • Investigating software testing process changes

    Sometimes a complete overhaul in the test process is necessary, but maybe there is another way. In this response, expert Pete Walen provides some tips for testers considering process changes.

  • What is needed to define software security requirements

    There are important distinctions between security requirements and security controls, as well as the expertise needed to define and satisfy each. In this expert response, Sue Burk offers a clear de...

  • Define security requirements and manage risk in SDLC

    Defining business security requirements is a collaborative effort, involving the participation of architects, business analysts and regulatory bodies. There is no black-and-white answer about achie...

  • What does "security testing" of my application mean?

    What does a manager mean by "security testing"? In this response, expert Pete Walen offers insights into the broad category of application security testing and also recommends asking for clarificat...

  • How is a burndown chart used in Agile development?

    Agile development teams are experimenting with various tools and processes to find what works best in their particular situation. In this expert response, Lisa Crispin explains what a burndown char...

  • Agile project management tools: Burndown charts

    High-functioning Agile teams realize the importance of the appropriate requirements tracking tools. Read this expert response from Lisa Crispin to learn alternatives to burndown charts such as stor...

  • When to classify security testing tools as ALM tools

    Application security testing tools can sometimes be considered part of the ALM tool set, and sometimes they fall under the category of the security management process. Read this expert response to ...

  • How to best security test your applications

    Security testing is an important factor in the application development process, and fortunately there are specialists who work to ensure that applications are as secure as possible. However, it can...

  • How to overcome the challenges with requirements

    Expert Sue Burk identifies the top challenges in accurately defining requirements as the challenge of involving the appropriate decision makers and subject matter experts in requirements developmen...

  • Understanding the dependencies between requirements

    Prioritizing user stories for each iteration in a Scrum environment can be challenging if the project owner does not understand the dependencies between requirements. In this expert response, Lisa ...

  • How user stories help to define software requirements

    User stories play an important role when defining requirements and they also contribute to living documentation during the software development process. In this expert response, Lisa Crispin offers...

  • Mapping software requirements to test cases

    Even though you must have at least one test case per requirement, it's possible not to have a one-to-one mapping between each requirement and test case. In this response, expert Sue Burk explains h...

  • Tracking changes to requirements in Agile development

    All development teams need to track requirements changes, but depending on the software development lifecycle and overall ALM process, the best approach to change tracking may not be the same acros...