security

Conference Presentations

Improve Security through Continuous Testing
Slideshow

Many companies develop strong software development practices that include ongoing testing throughout the development lifecycle. But they fail to account for the testing of security-related issues. This leads to security controls being tacked on to an application just before it goes to...

Jeremy Faircloth, Raytheon
The Coming Avalanche of Wearable Mobile Apps
Slideshow

For better or for worse—like it or not—mobile wearables are already changing our lives. Mobile wearable devices form a new generation of personalized technology that knows us better than our closest friends do. How many of your friends know how far you walked or what you ate? The challenge...

Philip Lew, XBOSoft
Tips and Tricks for Building Secure Mobile Apps
Slideshow

Mobile application development is now a mission-critical component of IT organizations and a big part of software industry’s landscape. Due to the security threats associated with mobile devices, it is critical we build our apps—from the ground up—to be secure and trustworthy. However...

Jeffery Payne, Coveros, Inc.
Architect a Winning Mobile Application
Slideshow

Building mobile apps in today’s highly dynamic environment comes with great uncertainty and risk. It’s imperative to make the right design choices early on. Poor architectural decisions can make or break an app. In this technical session, Shadi Saifan focuses on the architecture and design...

Shadi Saifan, FIS Mobile
Tips and Tricks for Building Secure Mobile Apps
Slideshow

Mobile application development is now a mission-critical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built to be secure from the ground up. However, many application developers and testers do...

Jeff Payne, Coveros, Inc.
Privacy and Data Security: Minimizing Reputational and Legal Risks
Slideshow

Privacy and data security are hot topics among US state and federal regulators as well as plaintiffs’ lawyers. Companies experiencing data breaches have been fined millions of dollars, paid out millions in settlements, and spent just as much on breach remediation efforts. In the past...

Tatiana Melnik, Melnik Legal, PLCC
The Power of an Individual Tester: The HealthCare.gov Experience
Video

Like millions of other Americans, Ben Simo visited HealthCare.gov in search of health insurance and found a frustratingly buggy website that was failing to fulfill its purpose―to educate people on the new health insurance law and help them purchase health insurance. After failing to create...

Ben Simo, eBay Inc.
Softwarts: Security Testing for Muggles
Video

Security testing is often shrouded in jargon and mystique. Security conjurers perform arcane rites using supposed “black hat” techniques and would have us believe that we cannot do the same. The fact is that security testing “magic” is little more than specialized application of...

Paco Hope, Citigal
Lightning Strikes the Keynotes
Video

Throughout the years, Lightning Talks have been a popular part of the STAR conferences. If you’re not familiar with the concept, Lightning Talks consists of a series of five-minute talks by different speakers within one presentation period. Lightning Talks are the...

Lee Copeland, Software Quality Engineering
Softwarts: Security Testing for Muggles
Slideshow

Security testing is often shrouded in jargon and mystique. Security conjurers perform arcane rites using supposed “black hat” techniques and would have us believe that we cannot do the same. The fact is that security testing “magic” is little more than specialized application of...

Paco Hope, Cigital

Pages

AgileConnection is one of the growing communities of the TechWell network.

Featuring fresh, insightful stories, TechWell.com is the place to go for what is happening in software development and delivery.  Join the conversation now!