SQL Injection and IoT Security Testing: Shieldcast - Winter 2018

SQL Injection and IoT Security Testing: Shieldcast - Winter 2018

Publish Date: February 14, 2018

This edition will talk about IoT security testing services that are applicable across any and every domain that is ready to leverage the technology. It also includes testing recommendations for SQL injection.

Should You Partner with an Outsourced QA Provider for Security Testing?

Should You Partner with an Outsourced QA Provider for Security Testing?

Publish Date: January 17, 2018

Ensuring the safety and integrity of enterprise data and networks is a lot more complicated than it used to be. With cyber attacks making headlines on a near-daily basis and malicious hackers getting smarter by the day, the security programs of yesterday just can’t cut it. There’s a growing consensus that a security strategy focused only on hardware, software, and policy-setting isn’t enough. For a fully comprehensive security program to be maintained, companies need to be vigilant in many different ways.

API testing and Automation Solutions: TechnoCast - Fall 2017

API testing and Automation Solutions: TechnoCast - Fall 2017

Publish Date: November 1, 2017

In this expert series, we bring you the concepts that help to understand API testing and its tools/techniques used to perform so that you can employ the right kind of approach as per your testing requirements.

DOS Attack And Tips To Choose Security Assessment Tools: Shieldcast - Fall 2017

DOS Attack And Tips To Choose Security Assessment Tools: Shieldcast - Fall 2017

Publish Date: October 4, 2017

In this expert series, we will discuss the things to consider while choosing a security testing tool, details about DOS(Denial-of-Service) Attacks and OWASP ZAP along with some latest news on cyber security.

5 Steps Your Provider Takes to Keep Your Application Safe While Software Testing Outsourcing

5 Steps Your Provider Takes to Keep Your Application Safe While Software Testing Outsourcing

Publish Date: May 24, 2017

Today, it seems like we don't go a week without hearing about a high-profile hack or breach of customer data. As customers, we spread our information across a huge variety of applications, and we trust that no ill will come of it. The truth is, however, that we’re more vulnerable than ever, and the risk of a hack is made clearer to us everyday. We rationalize the situation, thinking, “Well, they must have people safeguarding my information, right?” Right — for the most part.

Security Testing Report And Mobile App Penetration Testing: Shieldcast - Q1 2016

Security Testing Report And Mobile App Penetration Testing: Shieldcast - Q1 2016

Publish Date: June 15, 2016

The quarterly security expert series from QASource delivers the best practices, latest updates, tips, and the knowledge required for security testing of applications, be it web, mobile, or desktop.

Protecting Yourself from Common Security Shortfalls

Protecting Yourself from Common Security Shortfalls

Publish Date: December 15, 2015

Cyber attacks and other forms of malicious hacking are becoming more and more common. Because the exchange of login credentials and the transfer of precious data is often necessary when engaging with an outsourced QA team, strict security measures must be in place to ensure that there is no risk of a breach. A good QA partner ensures that your application's code is safe, secure, and strongly protected at all stages of testing. Though most organizations are vigilant and have strong security implemented to cover the major points of risk, there are some commonly overlooked areas that should not be neglected. In this post, we look at the damaging effect of poor security and the solutions that will prevent it.

... 2 3 4 5

Authors

Our bloggers are the test management experts at QASource. They are executives, QA managers, team leads, and testing practitioners. Their combined experience exceeds 100 years and they know how to optimize QA efforts in a variety of industries, domains, tools, and technologies.