security

Conference Presentations

Harness the Power of Checklists
Slideshow

As testers, we can feel overwhelmed by the sheer volume of things that require our attention. We are pressured to meet the demands of a fast-paced development environment while grappling with the extreme complexities inherent in today’s software. How can we remember everything while...

Kirk Lee, Infusionsoft
Security Testing: What Testers Can Do
Slideshow

Thousands of times each day, network perimeter security defenses fail to recognize new and obfuscated attacks. Rather than attempting to build security firewalls, Declan O’Riordan asserts that project teams must design, code, and test security into applications―and that requires skills...

Declan O'Riordan, Test and Verification Solutions
Improve Security through Continuous Testing
Slideshow

Many companies develop strong software development practices that include ongoing testing throughout the development lifecycle. But they fail to account for the testing of security-related issues. This leads to security controls being tacked on to an application just before it goes to...

Jeremy Faircloth, Raytheon
Architect a Winning Mobile Application
Slideshow

Building mobile apps in today’s highly dynamic environment comes with great uncertainty and risk. It’s imperative to make the right design choices early on. Poor architectural decisions can make or break an app. In this technical session, Shadi Saifan focuses on the architecture and design...

Shadi Saifan, FIS Mobile
The Coming Avalanche of Wearable Mobile Apps
Slideshow

For better or for worse—like it or not—mobile wearables are already changing our lives. Mobile wearable devices form a new generation of personalized technology that knows us better than our closest friends do. How many of your friends know how far you walked or what you ate? The challenge...

Philip Lew, XBOSoft
Mobile Dev + Test 2015: Tips and Tricks for Building Secure Mobile Apps
Slideshow

Mobile application development is now a mission-critical component of IT organizations and a big part of software industry’s landscape. Due to the security threats associated with mobile devices, it is critical we build our apps—from the ground up—to be secure and trustworthy. However...

Jeffery Payne, Coveros, Inc.
Privacy and Data Security: Minimizing Reputational and Legal Risks
Slideshow

Privacy and data security are hot topics among US state and federal regulators as well as plaintiffs’ lawyers. Companies experiencing data breaches have been fined millions of dollars, paid out millions in settlements, and spent just as much on breach remediation efforts. In the past...

Tatiana Melnik, Melnik Legal, PLCC
Better Software Conference East 2014: Tips and Tricks for Building Secure Mobile Apps
Slideshow

Mobile application development is now a mission-critical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built to be secure from the ground up. However, many application developers and testers do...

Jeff Payne, Coveros, Inc.
The Power of an Individual Tester: The HealthCare.gov Experience
Video

Like millions of other Americans, Ben Simo visited HealthCare.gov in search of health insurance and found a frustratingly buggy website that was failing to fulfill its purpose―to educate people on the new health insurance law and help them purchase health insurance. After failing to create...

Ben Simo, eBay Inc.
Softwarts: Security Testing for Muggles
Video

Security testing is often shrouded in jargon and mystique. Security conjurers perform arcane rites using supposed “black hat” techniques and would have us believe that we cannot do the same. The fact is that security testing “magic” is little more than specialized application of...

Paco Hope, Citigal

Pages

AgileConnection is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.