New & Notable
Penetration Testing News
February 21, 2019
GitHub's bug bounty program for 2019 increases the reward money for researchers who find security vulnerabilities in the company's code.
October 26, 2009
Start-up VisibleThread's new document structure and quality analysis tool has uses ranging from requirements management to documentation quality enforcer. VisibleThread's software structure and quality detection capabilities can improve development ...
June 14, 2009
Blueprint Requirements Center 2010 from Toronto-based Blueprint launched this week with new features targeting the needs of distributed teams and offering enhanced stakeholder collaboration. According to Tony Higgins, VP of products at Blueprint, ...
October 22, 2008
Agile software development bridges the software requirements communications gap by embracing flexibility and face-to-face communication rather than depending on documents to communicate, agile practitioners say.
Penetration Testing Get Started
Bring yourself up to speed with our introductory content
In this section of our agile development tutorial, learn tips and techniques for defining and gathering requirements in an agile environment. Continue Reading
What does the IEEE outline for requirements specifications, and how strictly should you abide by that standard? Expert Karl E. Wiegers digs into the details of an SRS. Continue Reading
Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product... (Continued) Continue Reading
Evaluate Penetration Testing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
While the name sounds strong, 'secure containers' have limitations as to how much security they really provide for mobile applications. Continue Reading
The jailbreaking of iOS devices has a huge affect on security. It opens the door for malicious hackers, and not just via adventurous consumers. Continue Reading
An SRS describes the requirements of a software product -- what it must do in order to function as expected. The standard format is identical regardless of the software's use. Continue Reading
Manage Penetration Testing
Learn to apply best practices and optimize your operations.
Testing an organization's security maturity is crucial for an organization to improve their post-assessment posture. Learn how red teaming can help this situation with Matt Pascucci. Continue Reading
Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security ... Continue Reading
Though complex, penetration testing is worth the effort and helps make Web applications as secure as possible. Here are some tips for testing effectively. Continue Reading
Problem Solve Penetration Testing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Testing expert Matthew Heusser attended CAST 2017 and was surprised to hear why testing less might lead to better software. Here are his key takeaways. Continue Reading
The internet of things is a challenge for software testers. Luckily, microservices and containers can make things more straightforward. Here's where to begin. Continue Reading
Kevin Beaver explains how to handle the security threats that may lurk in the network infrastructure and pop up in application security testing. Continue Reading