Conference Presentations

Improve Security through Continuous Testing
Slideshow

Many companies develop strong software development practices that include ongoing testing throughout the development lifecycle. But they fail to account for the testing of security-related issues. This leads to security controls being tacked on to an application just before it goes to...

Jeremy Faircloth, Raytheon
Mobile Dev + Test 2015: Tips and Tricks for Building Secure Mobile Apps
Slideshow

Mobile application development is now a mission-critical component of IT organizations and a big part of software industry’s landscape. Due to the security threats associated with mobile devices, it is critical we build our apps—from the ground up—to be secure and trustworthy. However...

Jeffery Payne, Coveros, Inc.
Architect a Winning Mobile Application
Slideshow

Building mobile apps in today’s highly dynamic environment comes with great uncertainty and risk. It’s imperative to make the right design choices early on. Poor architectural decisions can make or break an app. In this technical session, Shadi Saifan focuses on the architecture and design...

Shadi Saifan, FIS Mobile
The Coming Avalanche of Wearable Mobile Apps
Slideshow

For better or for worse—like it or not—mobile wearables are already changing our lives. Mobile wearable devices form a new generation of personalized technology that knows us better than our closest friends do. How many of your friends know how far you walked or what you ate? The challenge...

Philip Lew, XBOSoft
Privacy and Data Security: Minimizing Reputational and Legal Risks
Slideshow

Privacy and data security are hot topics among US state and federal regulators as well as plaintiffs’ lawyers. Companies experiencing data breaches have been fined millions of dollars, paid out millions in settlements, and spent just as much on breach remediation efforts. In the past...

Tatiana Melnik, Melnik Legal, PLCC
Better Software Conference East 2014: Tips and Tricks for Building Secure Mobile Apps
Slideshow

Mobile application development is now a mission-critical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built to be secure from the ground up. However, many application developers and testers do...

Jeff Payne, Coveros, Inc.
The Power of an Individual Tester: The HealthCare.gov Experience
Video

Like millions of other Americans, Ben Simo visited HealthCare.gov in search of health insurance and found a frustratingly buggy website that was failing to fulfill its purpose―to educate people on the new health insurance law and help them purchase health insurance. After failing to create...

Ben Simo, eBay Inc.
Softwarts: Security Testing for Muggles
Video

Security testing is often shrouded in jargon and mystique. Security conjurers perform arcane rites using supposed “black hat” techniques and would have us believe that we cannot do the same. The fact is that security testing “magic” is little more than specialized application of...

Paco Hope, Citigal
Softwarts: Security Testing for Muggles
Slideshow

Security testing is often shrouded in jargon and mystique. Security conjurers perform arcane rites using supposed “black hat” techniques and would have us believe that we cannot do the same. The fact is that security testing “magic” is little more than specialized application of...

Paco Hope, Cigital
Top Ten Attacks to Break Mobile Apps
Slideshow

To aid development in the mobile and smartphone app world, testers must do more than simply test against requirements; they should include attack-based testing to find common errors. In the tradition of James Whittaker’s How to Break Software books, Jon Hagar applies the testing...

Jon Hagar, Grand Software Testing

Pages

CMCrossroads is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.