When considering mobility and digital transformation testing, customers today demand ‘anytime- anything-anywhere’ service with the finest experience. From wanting new, upgraded, contemporary features in mobile apps and websites, to getting… Read More +
For many years, security didn't include the development and release process. Organisations didn't carry out protection validation as they didn't understand the potential risks or the added value. But as… Read More +
What is shift left? In its most simple terms, “shift left” security is moving security to the earliest possible point in the development process. Modern CI/CD typically involves an eight-step… Read More +
How do we handle cybersecurity during COVID-19? There has been an increase in the number of people working from home due to the coronavirus pandemic. Businesses have been forced to… Read More +
Are you concerned about data security? The outbreak of Covid-19 has left multiple governments of the world flailing, businesses unprepared, and people on a constant lookout for sanitizers and masks… Read More +
Developers and security testers need to pay special attention to vulnerabilities of their source code and in particular when using open-source components. The ransomware often takes advantage of vulnerabilities or… Read More +
Are you a computer savvy who understands everything about malware? If you are, then you probably understand the turn of events in May 2017. If you are not, on the… Read More +
Spring Security – Third Edition starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with… Read More +
Security issues are still a major concern for all IT organizations. For many enterprises, the move to cloud computing has raised concerns for security, but when applications are built with… Read More +
Mastering Kali Linux for Advanced Penetration Testing will provide you with a number or proven techniques to defeat the latest defences on the networks using Kali Linux. From selecting the most… Read More +
In today’s world, value generation is more and more dependent on Information Technology. IT is susceptible to serious cyber threats and all enterprises need to address these with a high… Read More +
If you use a Smartphone, you’d be familiar with this. On an average, billions of mobile applications are downloaded every year by those who use smartphones. Be it Apple, Android… Read More +
While we have researched and documented many examples of hardware security issues with IoT devices, the most common source of IoT security flaws lies within the apps that are used… Read More +
I just wanted to give you an overview how one can be a Penetration Tester with a little guide on how to do Penetration Testing. I’m not gonna talk about… Read More +
Awarded EuroSTAR Best Paper 2016 Application Security testing is a broad and deep topic that few Testers or Developers ever master. Static and dynamic analysis vulnerability detection tools are proven… Read More +
This eBook extract from 'Effective Python Penetration Testing' will concentrate on Chapter 1: Python Scripting Essentials It will begin by providing you with an overview of Python scripting and penetration… Read More +
If you’re a web application functional tester, you’ve almost certainly used a proxy to test a few features. (If not, you should!) In this webinar, Paco will briefly show how… Read More +
Welcome back to Testing In the Pub. We’ve got a great interview to start our new season of podcasts. We talk to Declan O’Riordan about his 3 epiphanies of security… Read More +
Some security experts would tell you that security testing is very different from functional or non-functional software testing. They are wrong. Having worked on both sides, Paco gives 3 specific… Read More +
Are our systems secure? The short answer is "No“. Yes, SOME systems are secure, but most of them are not. My father remembers the time when people did not lock… Read More +
Icebergs can be deceptive when looked at! They encompass a huge mass below the sea level which is around 90 % of its actual size, leaving only 10 % for… Read More +
Wherever, whatever application store some data about sensitive information and interact with server using API methods, then it's possible for someone to possibly hack the data from API if you have… Read More +
Already this year the Identity Theft Resource Centre has reported 101 data breaches with over 80M records stolen. The US military Twitter account was recently hacked by terrorists. The Sony data breach… Read More +
With the advent of BYOD (Bring your own device), enterprises are adding time and resources to ensure they can get the maximum benefit from the personal devices that employees bring… Read More +
Passive testing resulted in several of my internet-facing projects receiving little regard to security other than the traditional access control matrix. Upon deciding to take a more assertive approach to… Read More +
A penetration testing expert is better at pen-testing than me, but should I simply delegate application security to specialists and network firewalls? Actually no, I shouldn’t and neither should anyone… Read More +
Welcome to Testing In The Pub, your regular podcast all about software testing. In this episode we talk to Dan Billing about security testing. This is part 1 of a… Read More +
I am currently working in Mobile Security Testing as a penetration tester. Before this I worked on software/web application development and when I tuned my career towards software/mobile app testing,… Read More +
This webinar looks at the evolution of application security testing and is presented by security testing expert Declan O'Riordan. O' Riordan speaks about the historical path to the present situation,… Read More +
By using this website you consent to our use of cookies. For more information on cookies see our Read MoreAccept
Privacy & Cookies
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.