New & Notable
Penetration testing News
February 21, 2019
GitHub's bug bounty program for 2019 increases the reward money for researchers who find security vulnerabilities in the company's code.
February 19, 2013
Check out the top ten threats presented by enterprise mobile applications, according to the OWASP Mobile Security Project.
October 26, 2009
Start-up VisibleThread's new document structure and quality analysis tool has uses ranging from requirements management to documentation quality enforcer. VisibleThread's software structure and quality detection capabilities can improve development ...
June 14, 2009
Blueprint Requirements Center 2010 from Toronto-based Blueprint launched this week with new features targeting the needs of distributed teams and offering enhanced stakeholder collaboration. According to Tony Higgins, VP of products at Blueprint, ...
Penetration testing Get Started
Bring yourself up to speed with our introductory content
Is penetration testing the same as red team engagement? There are similarities, but they're not the same. Understand the differences to improve your organization's cyberdefenses. Continue Reading
A software requirements specification (SRS) is a comprehensive description of the intended purpose and environment for software under development. The SRS fully describes what the software will do and how it will be expected to perform... (Continued) Continue Reading
A functional specification is a formal document used to describe a product's intended capabilities, appearance, and interactions with users in detail for software developers. Continue Reading
Evaluate Penetration testing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
While the name sounds strong, 'secure containers' have limitations as to how much security they really provide for mobile applications. Continue Reading
The jailbreaking of iOS devices has a huge affect on security. It opens the door for malicious hackers, and not just via adventurous consumers. Continue Reading
This guide explains what's involved in addressing application security form a software tester's perspective by presenting common threats and strategies to deal with them. Continue Reading
Manage Penetration testing
Learn to apply best practices and optimize your operations.
Testing an organization's security maturity is crucial for an organization to improve their post-assessment posture. Learn how red teaming can help this situation with Matt Pascucci. Continue Reading
Software technology has impacted nearly everyone everywhere with the intention of improving lifestyles. However, when crucial security steps aren't being met, these technologies can take a catastrophic turn. To avoid hacking and other security ... Continue Reading
Though complex, penetration testing is worth the effort and helps make Web applications as secure as possible. Here are some tips for testing effectively. Continue Reading
Problem Solve Penetration testing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
For developers, security is not often a high priority -- but it should be. Automated security scanning tools can help detect and address weaknesses before evildoers discover them. Continue Reading
Testing expert Matthew Heusser attended CAST 2017 and was surprised to hear why testing less might lead to better software. Here are his key takeaways. Continue Reading
The internet of things is a challenge for software testers. Luckily, microservices and containers can make things more straightforward. Here's where to begin. Continue Reading