In this, information security expert Kevin Beaver explores the underlying causes of gaps in the software testing...
process and offers suggestions on what can be done to fix this problem once and for all. Find a webcast on software security oversights, a podcast on security blunders and a tip on how security measures fail and how best to fix them in this lesson.
Security comprises a significant portion of the overall quality of software yet we continue to see software flaws that, at best, create unnecessary business risks and often lead to application-level data breaches. In this security lesson, information security expert Kevin Beaver explores the underlying causes of such gaps in the software testing process and offers suggestions on what can be done to fix this problem once and for all. If you’re a QA analyst/tester, developer, or otherwise involved in the overall quality and security of software in your business this security lesson is for you. View the webcast.
In this audiocast, security test expert Kevin Beaver talks about the importance of security testing and how to get management buy-in. Beaver describes the most common application security flaws and claims the biggest oversight when in security testing in inaction. Tune in as he describes a game plan that will help you move your security testing efforts forward.
Download for later:
- Internet Explorer: Right Click > Save Target As
- Firefox: Right Click > Save Link As
Contract obligations, concerns over whether features will provide ROI and poor management are some of the major factors holding back application security progress. Misaligned security focus has frustrated improvements in security, and while some concerns are realistic, others are far-fetched. Hear what a security consultant says is key in securing applications.Read the full story.
About the author: Kevin Beaver is an independent information security consultant, speaker and expert witness with Atlanta-based Principle Logic, LLC. He has over 20 years experience in the industry and specializes in performing independent information security assessments revolving around compliance and information risk management. Kevin has authored/co-authored seven books on information security including the ethical hacking books, Hacking for Dummies and Hacking Wireless Networks for Dummies (Wiley). He's also the creator of the Security On Wheels IT security audio books.