SBOMs can help ensure software integrity

To secure the software in your supply chain, there’s a lot of hype today about the need for an SBOM (software bill of materials). But what does that really mean for development teams today? BOMs have been used for years by organizations; they are a list of the raw materials, sub-assemblies, intermediate assemblies, sub-components, parts, … continue reading

Optimize continuous delivery with continuous reliability

The 2021 State of DevOps report indicates that greater than 74% of organizations surveyed have Change Failure Rate (CFR) greater than 16% (the report provides a range from 16% to 30%). Of these, a significant proportion (> 35%) likely have CFRs exceeding 23%.  This means that while organizations seek to increase software change velocity (as … continue reading

Asking developers to do security is a risk in itself without training

As the pace and complexity of software development increases, organizations are looking for ways to improve the performance and effectiveness of their application security testing, including “shifting left” by integrating security testing directly into developer tools and workflows. This makes a lot of sense, because defects, including security defects, can often be addressed faster and … continue reading

The next wave in service virtualization: Intelligent mocks!

Did you know that service virtualization has been around for about two decades? That’s right. Even before the cloud was considered mainstream, we had service virtualization solutions to help in the development and testing of software applications.  As a refresher, service virtualization is a technique that simulates the behavior of various components in software applications. … continue reading

Combining Static Application Security Testing (SAST) and Software Composition Analysis (SCA) Tools

When creating, testing, and deploying software, many development companies now use proprietary software and open source software (OSS).    Proprietary software, also known as closed-source or non-free software, includes applications for which the publisher or another person reserves licensing rights to modify, use, or share modifications. Examples include Adobe Flash Player, Adobe Photoshop, macOS, Microsoft … continue reading

Protect your company from IP loss

When you hear about the impacts of not protecting your application, you most often think of the financial loss. It’s no wonder though: the average cost of vulnerabilities is about $13 million dollars, spread across fines, the cost of remediation, and the cost of preventing data leakage. It’s not even factoring in the cost of … continue reading

Flatirons Fuse: Simplifying data imports

The challenge of moving data between platforms, between organizations, or even something as seemingly simple as onboarding a new customer, has been a pervasive one, especially considering how important accurate and available data is to pretty much every business. The problem of transferring data has led to numerous file formats, notably Excel spreadsheets and multiple … continue reading

Maximizing engineering resources with quality engineering

Modern software development can often feel like a Catch-22: to keep customers happy, companies must deliver new features faster. But deliver too fast without enough testing and bugs can slip into production, frustrating the customers who eagerly awaited the new feature in the first place. This paradigm often pits quality assurance against developers as they … continue reading

Why performance testing is so vital and so difficult

The ability to ensure applications deliver consistent, responsive performance at all times is critical for pretty much every organization, and is especially vital for retailers and other e-commerce providers.  Even if an app delivers the best, most innovative functionality, it won’t matter if loading or transactions take too long. Further, as users continue to grow … continue reading

The role of software testing and quality engineering in DevOps adoption

Most teams are somewhere on the path to DevOps maturity, with just 11% saying they’ve implemented full automation in DevOps. This means that despite being around for almost two decades, most organizations are still figuring out what full DevOps adoption looks like for their teams. However, after years of disruption, rising customer expectations for digital … continue reading

How obfuscation can help with data breach mitigation

Data breaches are nothing new, but they have pretty consistently increased year-over-year. Despite the massive amounts of money companies invest into security to prevent breaches, they still commonly occur. According to a report from the Identity Theft Resource Center (ITRC), 2021 saw an all-time high of data breaches, 23% more than the previous all-time high.  … continue reading

Continuous test data management for microservices, Part 2: Key steps

This is part 2 in a series on applying test data management (TDM) to microservices. Part 1 can be found here.  The continuous TDM process for microservices applications is similar to that for general continuous TDM, but tailored to the nuances of the architecture. The key differences are as follows:  Step 1(b): Agile Design Rigorous … continue reading

Developing data security for finance/banking

Cybercriminals target corporations with high-value assets to steal data, expose infrastructure vulnerabilities, and to ruin customer confidence. The average cost of a data breach, according to the Cost of a Data Breach Report 2021 by IBM Security, is $161 ($146 in 2020) per record. And the average total cost of a data breach in 2021 … continue reading

Continuous test data management for microservices, Part 1: Key approaches

Applying TDM to microservices is quite challenging. This is due to the fact that an application may have many services, each with its own underlying diverse data store. Also, there can be intricate dependencies between these services, resulting in a type of ‘spaghetti architecture.’ For these systems, TDM for end-to-end system tests can be quite … continue reading

« Previous PageNext Page »
DMCA.com Protection Status