|
Better Software Conference East 2014: Tips and Tricks for Building Secure Mobile Apps
Slideshow
Mobile application development is now a mission-critical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built to be secure from the ground up. However, many application developers and testers do...
|
Jeff Payne, Coveros, Inc.
|
|
Privacy and Data Security: Minimizing Reputational and Legal Risks
Slideshow
Privacy and data security are hot topics among US state and federal regulators as well as plaintiffs’ lawyers. Companies experiencing data breaches have been fined millions of dollars, paid out millions in settlements, and spent just as much on breach remediation efforts. In the past...
|
Tatiana Melnik, Melnik Legal, PLCC
|
|
The Power of an Individual Tester: The HealthCare.gov Experience
Video
Like millions of other Americans, Ben Simo visited HealthCare.gov in search of health insurance and found a frustratingly buggy website that was failing to fulfill its purpose―to educate people on the new health insurance law and help them purchase health insurance. After failing to create...
|
Ben Simo, eBay Inc.
|
|
Softwarts: Security Testing for Muggles
Slideshow
Security testing is often shrouded in jargon and mystique. Security conjurers perform arcane rites using supposed “black hat” techniques and would have us believe that we cannot do the same. The fact is that security testing “magic” is little more than specialized application of...
|
Paco Hope, Cigital
|
|
Top Ten Attacks to Break Mobile Apps
Slideshow
To aid development in the mobile and smartphone app world, testers must do more than simply test against requirements; they should include attack-based testing to find common errors. In the tradition of James Whittaker’s How to Break Software books, Jon Hagar applies the testing...
|
Jon Hagar, Grand Software Testing
|
|
Testing Application Security: The Hacker Psyche Exposed
Slideshow
Computer hacking isn’t a new thing, but the threat is real and growing even today. It is always the attacker’s advantage and the defender’s dilemma. How do you keep your secrets safe and your data protected? In today’s ever-changing technology landscape, the fundamentals of producing...
|
Mike Benkovich, Imagine Technologies, Inc.
|