Combining Static Application Security Testing (SAST) and Software Composition Analysis (SCA) Tools

When creating, testing, and deploying software, many development companies now use proprietary software and open source software (OSS).    Proprietary software, also known as closed-source or non-free software, includes applications for which the publisher or another person reserves licensing rights to modify, use, or share modifications. Examples include Adobe Flash Player, Adobe Photoshop, macOS, Microsoft … continue reading

Protect your company from IP loss

When you hear about the impacts of not protecting your application, you most often think of the financial loss. It’s no wonder though: the average cost of vulnerabilities is about $13 million dollars, spread across fines, the cost of remediation, and the cost of preventing data leakage. It’s not even factoring in the cost of … continue reading

Flatirons Fuse: Simplifying data imports

The challenge of moving data between platforms, between organizations, or even something as seemingly simple as onboarding a new customer, has been a pervasive one, especially considering how important accurate and available data is to pretty much every business. The problem of transferring data has led to numerous file formats, notably Excel spreadsheets and multiple … continue reading

Maximizing engineering resources with quality engineering

Modern software development can often feel like a Catch-22: to keep customers happy, companies must deliver new features faster. But deliver too fast without enough testing and bugs can slip into production, frustrating the customers who eagerly awaited the new feature in the first place. This paradigm often pits quality assurance against developers as they … continue reading

Why performance testing is so vital and so difficult

The ability to ensure applications deliver consistent, responsive performance at all times is critical for pretty much every organization, and is especially vital for retailers and other e-commerce providers.  Even if an app delivers the best, most innovative functionality, it won’t matter if loading or transactions take too long. Further, as users continue to grow … continue reading

The role of software testing and quality engineering in DevOps adoption

Most teams are somewhere on the path to DevOps maturity, with just 11% saying they’ve implemented full automation in DevOps. This means that despite being around for almost two decades, most organizations are still figuring out what full DevOps adoption looks like for their teams. However, after years of disruption, rising customer expectations for digital … continue reading

How obfuscation can help with data breach mitigation

Data breaches are nothing new, but they have pretty consistently increased year-over-year. Despite the massive amounts of money companies invest into security to prevent breaches, they still commonly occur. According to a report from the Identity Theft Resource Center (ITRC), 2021 saw an all-time high of data breaches, 23% more than the previous all-time high.  … continue reading

Continuous test data management for microservices, Part 2: Key steps

This is part 2 in a series on applying test data management (TDM) to microservices. Part 1 can be found here.  The continuous TDM process for microservices applications is similar to that for general continuous TDM, but tailored to the nuances of the architecture. The key differences are as follows:  Step 1(b): Agile Design Rigorous … continue reading

Developing data security for finance/banking

Cybercriminals target corporations with high-value assets to steal data, expose infrastructure vulnerabilities, and to ruin customer confidence. The average cost of a data breach, according to the Cost of a Data Breach Report 2021 by IBM Security, is $161 ($146 in 2020) per record. And the average total cost of a data breach in 2021 … continue reading

Continuous test data management for microservices, Part 1: Key approaches

Applying TDM to microservices is quite challenging. This is due to the fact that an application may have many services, each with its own underlying diverse data store. Also, there can be intricate dependencies between these services, resulting in a type of ‘spaghetti architecture.’ For these systems, TDM for end-to-end system tests can be quite … continue reading

The Dynamic Workload Console is the one-stop automation platform for users across the business

The Dynamic Workload Console (DWC) has become a core platform for workload automation, providing visibility into everything all in one place. “The designing of a job stream is a key operation for schedulers and application developers to or interconnect business applications and achieve governance and control,” Zaccone said. “Our idea with the new Workload Designer … continue reading

Optimize data transfer and integrate file transfer in your automation workflows

Workload automation is a critical piece of digital transformation. It can enable practitioners to schedule and execute business process workflows, optimize data transfer and processing and cut down on errors and delays in execution of the business processes themselves.  Businesses currently have three main approaches to modernization and digital transformation. One is that they are … continue reading

Prevention in the age of the never-ending attack surface

When we talk about progress, typically, digital advancement is at the forefront of the conversation. We want everything better, faster, more convenient, more powerful, and we want to do it for less money, time, and risk. For the most part, these “impossible” objectives are eventually met; it might take several years and multiple versions (and … continue reading

Disrupting the economics of software testing through AI

EMA (Enterprise Management Associates) recently released a report titled “Disrupting the Economics of Software Testing Through AI.” In this report, author Torsten Volk, managing research director at EMA, discusses the reasons why traditional approaches to software quality cannot scale to meet the needs of modern software delivery. He highlights five key categories of AI and … continue reading

« Previous PageNext Page »
DMCA.com Protection Status