QASource Blog

Software Testing for the Security Domain: A Case Study

Is QA testing necessary for security software? Software QA is absolutely necessary. We are constantly hearing about data breaches occurring seemingly every day, so products and software that can ensure users' safety are in high demand. This surge in demand for security software increases the pressure security product organizations feel as they release new software. Read on to discover how a security company learned that in order to guarantee the safety of users, cybersecurity companies should invest in a QA partner.

Frequently Asked API Testing Questions (Infographic)

As our society becomes more interconnected, testing APIs is critical. Because of this, many software companies are considering or are already implementing API testing into their QA process. Many are also automating their API testing. Since your brand's reputation is at stake, it is imperative that any new endeavor be thoroughly researched. In order to assist you in this, our expert API engineers at QASource have shared and answered the top 3 questions about API testing. 

Check out QASource’s latest infographic below to read our expert engineer's responses to these frequently asked questions by fellow organizations considering testing APIs.

How to Integrate Regression Testing into Your QA Services

Any time a feature is added or improved, an application’s code is in danger. There’s no escaping it, unfortunately: Any time a developer touches an existing piece of code, s/he introduces the possibility of breakage and new defects. This is especially true, and most common, in the areas where new code meets old.

MobiCast - Summer 2018

Looking Ahead: Facial Recognition Technology and QA Services

The world of data security is changing rapidly - so rapidly that it can be hard to keep track of all the authentication methods that see wide usage and adoption from product companies. Currently, there are three main categories for security solutions. First, what we know: Your standard alphanumeric passwords and security questions. Second, what we carry: Hand-held items like key cards and ID badges. And third, what we are: Unique bodily identifiers that are nearly impossible to replicate.

We’re all familiar with choosing super-strong passwords and clipping an ID badge on our belt loop before leaving the house. But in general, biometric authentication is still a relatively new category in the security space.

TechnoCast - Summer 2018

ShieldCast - Spring 2018

3 Third-Party Integration Challenges and How to Overcome Them

Ideally, your collaboration product delivers efficiency, productivity, and flexibility to its users. By integrating relevant third-party applications, such as single sign-on capability, social media sharing features, customer relationship management, and document editors, you can add considerable value to your product and greatly improve the user’s experience. Thorough QA services ensure that your integrations work as expected and do not affect the existing functionalities of your product.

Onboarding a QA Partner

Onboarding a QA partner can be overwhelming to any company. In order to curb any anxiety, there are several things to consider. This includes not just availability of the partner, but testing infrastructure, training, domain experience, precious experience, communication skills, as well as resources. Allocating your resources appropriately allows you to proceed with the onboarding process with ease and can boost your QA productivity in the long run.

Biometrics and QA Services: Changing the Security Landscape

Remember the days when storing sensitive data behind a simple alphanumeric password worked just fine? Those were the days... such simple, innocent days. Every time the latest company data breach makes the news, we’re reminded that those days are over. As hackers and leakers become ever more skilled and brazen, product companies are responding by doubling down on security measures to protect their users, proprietary information, and their reputation in the market.

Today, access control goes far beyond the keyboard. The advent of biometrics - the process of authenticating a person using physical or behavioral characteristics - is expanding the reach of security and increasing its effectiveness.

1 2 3 4 5 ... Next

Written by QA Experts

QASource Blog, for executives and engineers, shares QA strategies, methodologies, and new ideas to inform and help effectively deliver quality products, websites, and applications.

Subscribe to our blog

Authors

Our bloggers are the test management experts at QASource. They are executives, QA managers, team leads, and testing practitioners. Their combined experience exceeds 100 years and they know how to optimize QA efforts in a variety of industries, domains, tools, and technologies.

Popular Posts