Coffee Breaks Brought to You By: Full Stack, End-to-End Automated Testing

Keysight’s Eggplant intelligent test automation can interact with various layers of the testing environment. And by testing real user scenarios, Keysight’s Eggplant can validate data integrity across the entire application workflow. In this brief demonstration, Kieran Leicester, Technical Consult at Keysight Technologies, will use Eggplant to look up a colleague, schedule a meet up convenient … continue reading

2022 CI/CD Solutions Guide

In the past, the CI/CD pipelines were simply a place to integrate code. Developers would write their code in GitHub, pass it through the pipeline, and then deploy it. However, with the emergence of shift left security and newer automation practices, the pipeline has become a much more critical piece of the software delivery lifecycle. … continue reading

Guide: The secure code training blueprint

Defining a plan to improve developer security maturity is no easy task when you still have compliance requirements and release deadlines to meet. But it is a worthy one that will pay dividends in improved productivity and reduced risk. In this guide, we explore the lessons learned from three real-life Secure Code Warrior customers so … continue reading

The Ultimate Guide to Securing Mobile Apps

Each year, attacks on mobile applications steadily increase. The costs to businesses in terms of lost customers, compensation, reputation damage, and regulatory fines make lax mobile app security a significant risk factor. Ensuring effective mobile app security, however, presents a major challenge for many organizations. Download this mobile app security guide to learn: Why mobile … continue reading

Developer security maturity matrix

Building security maturity in development teams can be approached in stages. Based on Secure Code Warrior’s experience with 400+ organizations, we’ve identified the common practices and traits in three different stages of security maturity – defining, adopting, and scaling. How security-savvy are your development teams? … continue reading

The importance of security maturity for development teams

By assessing and understanding a development team’s security maturity, organizations can formulate a plan, with the right stakeholders, process, and technology to build and support the necessary skills and capabilities. This whitepaper explores: What is security maturity in development teams, and why is it important? What are the different stages and characteristics of security maturity … continue reading

Four technical hands-on labs for mobile application security

Welcome to !hooked, Guardsquare’s technical magazine featuring hands-on labs. In this issue, the labs cover code checksumming, control flow (non-)integrity in Android applications, native library encryption, and encrypting Objective-C selectors. Dive in, learn about the issues, and work through the solutions in these labs. … continue reading

DevOps at Scale: Release Faster in More Complex Environments with Test Automation

How do you scale your testing to realize the full value of DevOps? In this session, Ethan Chung, Solutions Architect Manager at Keysight Technologies, will show how to expand testing coverage across complex applications with intelligent automation. Watch now to learn the basics of automation right through to building sophisticated test cases that integrate with … continue reading

How to choose the right Service Virtualization Solution

So. What IS Service Virtualization? Service virtualization is a key enabler to any test automation project, by providing an effective way to simulate dependent services that are out of your control for testing, by creating stable and predictable test environments. Your test automation will be reliable and accurate. But there are several different approaches and … continue reading

The Solution to Your Test Data Management (TDM) Headaches

Did you know that up to 20% of the average software development lifecycle is lost waiting for data? Test data is hard to procure and a risk to manage, but also a requirement. A method based on secure, real data capture provides the best solution for attaining the data. Parasoft goes beyond traditional test data … continue reading

The Guide to Advanced Jenkins

As teams, environments, projects, and market pressures increase, so do the administrative tasks associated with maintaining and administering Jenkins, one of the most popular development tools on the planet. Scaling Jenkins usage across a growing enterprise, without affecting the security or stability of its SDLC is challenging, particularly for highly regulated industries. Since CloudBees is … continue reading

Five reasons why enterprises using Jenkins adopt CloudBees CI

CloudBees CI is a unified governance engine for managing all of the CI automation needs of software development organizations practicing continuous integration. It leverages Jenkins, arguably the most popular development tools out there. Given this, there are five main reasons why companies chose CloudBees CI: Centralized Management Elastic Scaling Download this short report and find … continue reading

« Previous PageNext Page »
DMCA.com Protection Status