Software Security Testing and Quality Assurance News
April 27, 2015
Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.
March 25, 2015
Secunia's 2015 Vulnerability Report shows that better vulnerability reporting and awareness of flaws doesn't necessarily mean vendors offer more patches or focus on the most critical issues.
September 16, 2014
Developers increasingly rely on a variety of open source components, but a VerSprite researcher warns that security issues accompany many popular frameworks.
April 03, 2014
Mobile ALM expert Manish Mathuria provides insight into mobile security and offers strategies for enterprises to better protect their software.
Software Security Testing and Quality Assurance Get Started
Bring yourself up to speed with our introductory content
A new programming language called Wyvern is helping developers use multiple languages in one app securely. Application security expert Michael Cobb discusses. Continue Reading
For those of us new to software security testing, it can be an intimidating field of study. Where do the veterans suggest we begin? Continue Reading
The software attack surface is the complete profile of all functions in any code running in a given system that are available to an unauthenticated user. The more surface there is, the better the chance an attacker or a piece of malware can use ... Continue Reading
Evaluate Software Security Testing and Quality Assurance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Whether it is obvious in an organization or not, API testing exists. Learn why API testing is necessary in the application world. Continue Reading
Testing data exchanges involves the ability to view, track and verify messages, among other things. Here are techniques for testing data exchanges. Continue Reading
Private and non-public data must not be compromised during testing. Learn about data masking and the vendors that offer data masking tools. Continue Reading
Product ReviewsPowered by IT Central Station
Enables developers and testers to quickly automate the user actions at the browser level, which also helps measuring the end user experience by measuring the browser rendering times.Powered by IT Central Station
Valuable Features: StormRunner Load reduces the overall time for performance testing engagement and is best suited for the products in agile...Continue Reading
Very rich automation/test management framework but consider the coding needed to integrate with your applicationPowered by IT Central Station
Recently, I was asked a set of questions regarding my experience with TOSCA. Here are the questions and my answers: General info: Is...Continue Reading
This software solution has allowed us to run larger, high concurrency performance testing cycles in a very repetitive manner.Powered by IT Central Station
Valuable Features: Flexibility and speed to provision and start large (high concurrency) performance testing cycles. • Improvements to My...Continue Reading
Manage Software Security Testing and Quality Assurance
Learn to apply best practices and optimize your operations.
Discover whether or not test cases are necessary in this expert answer by consultant Robin Goldsmith. Continue Reading
Learn some cloud application testing techniques to ensure data security. Continue Reading
Though complex, penetration testing is worth the effort and helps make Web applications as secure as possible. Here are some tips for testing effectively. Continue Reading
Problem Solve Software Security Testing and Quality Assurance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Planning ahead in security testing helps to ensure a secure embedded system. Continue Reading
Embedded software testing tools are useful for catching defects during unit, integration and system testing. Here are five such tools that can make testing easier. Continue Reading
Our business is relying more and more on smart process applications to manage business-critical processes. This means application security is even more important than ever. What's your advice on ensuring not only that the code is secure, but that ... Continue Reading