Software security is a critical concern for businesses and organizations of all sizes. With the increasing sophistication of cyberattacks and the growing number of vulnerabilities in software, it's more important… Read More +
Performing AST (Application Security Testing) is a common and effective way to find vulnerabilities and weaknesses in an application and make it resistant to security threats. Traditionally, AST has been… Read More +
In an era of rapid digitisation, enterprises are adopting technology at a frenetic pace. The benefits accrued thereby include enhanced productivity, better customer service, scalability of operations, and increased revenue.… Read More +
No organisation is safe from cybercrimes. Cybercriminals continue targeting high-profile businesses worldwide, and your organisation isn’t an exception. According to Data Protnet statics, 70% of small businesses are unprepared for… Read More +
As the world becomes increasingly digitized, cybersecurity is more important than ever. Businesses of all sizes must take steps to protect their data from cyberattacks. While there are many different… Read More +
Web application security is important for protecting your business from hackers. In this guide, we will discuss some of the most common web application security weaknesses and provide tips on… Read More +
In the contemporary world, having a fraud detection software is essential for the well-being of any business. It can help protect your customers' information and safeguard your company's reputation. It… Read More +
Nowadays QA companies that test the security level of local networks offer an integrated approach. In this article, we’ll take a look at one effective tool that help detect and… Read More +
DAST stands for Dynamic Application Security Testing and it is a technique for detecting software security flaws. This type of testing is essential since it may help discover and repair… Read More +
Software development is a multi-stage process that is fundamentally difficult to predict, plan, and execute. In addition, by its very nature, the software is intangible and generally involves many stakeholders.… Read More +
Every day, we use and generate huge amounts of data. And this data is used by different sectors like healthcare, finance, marketing, and others. However, data breaches are increasingly rampant these days.… Read More +
Since cybercrime is still one of humanity's greatest dangers, today's successful companies place a high priority on security and information protection. For the year 2021, Cybersecurity Ventures estimates that the… Read More +
Imagine you are a tester having some knowledge about testing APIs either manually or using popular Java-based library for automation i.e. Rest-Assured. Your project manager approaches you and asks you… Read More +
In order to stay competitive, lots of businesses are constantly innovating and updating their technology. Not to mention that 2020 saw a surge in digital transformation and remote working as… Read More +
Today no organisation can function without some sort of cybersecurity whether that be in-house or an external service. From the evidence of the rise of commercial cyber attacks taking place,… Read More +
As a result of the emerging cybersecurity threats, the BFSI (Banking, Financial services and insurance) sector should initiate a series of steps to strengthen its cybersecurity architecture. This includes utilising… Read More +
To understand the process of transaction and payment integration, one must have thorough knowledge about payment gateways. In the following article, we are going to discuss some facts and figures,… Read More +
Testing is a crucial part of developing software. You need to ensure that your software development is secure down to the very unit of source code. With that in mind,… Read More +
Are you satisfied with your situation? If not you can try to accept it, or leave, or change yourself, or change the situation. Bitcoin and Blockchain were created by Cypherpunks… Read More +
Digital data is the new gold, and hackers will stop at nothing to get yours. In a study by cybersecurity experts at Maryland University, researchers found that cyber-attacks happen once… Read More +
When considering mobility and digital transformation testing, customers today demand ‘anytime- anything-anywhere’ service with the finest experience. From wanting new, upgraded, contemporary features in mobile apps and websites, to getting… Read More +
For many years, security didn't include the development and release process. Organisations didn't carry out protection validation as they didn't understand the potential risks or the added value. But as… Read More +
What is shift left? In its most simple terms, “shift left” security is moving security to the earliest possible point in the development process. Modern CI/CD typically involves an eight-step… Read More +
How do we handle cybersecurity during COVID-19? There has been an increase in the number of people working from home due to the coronavirus pandemic. Businesses have been forced to… Read More +
Are you concerned about data security? The outbreak of Covid-19 has left multiple governments of the world flailing, businesses unprepared, and people on a constant lookout for sanitizers and masks… Read More +
Developers and security testers need to pay special attention to vulnerabilities of their source code and in particular when using open-source components. The ransomware often takes advantage of vulnerabilities or… Read More +
As a software tester you are probably aware of the many online security threats out there. It is no secret that severe cyber security attacks are on the increase. Businesses… Read More +
Are you a computer savvy who understands everything about malware? If you are, then you probably understand the turn of events in May 2017. If you are not, on the… Read More +
The EuroSTAR Best Paper 2018 was awarded to James Christie for his paper Facing the Dragons, Dealing with Complex Unknowable Systems. We are delighted to present it to you as… Read More +
Spring Security – Third Edition starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with… Read More +
Security issues are still a major concern for all IT organizations. For many enterprises, the move to cloud computing has raised concerns for security, but when applications are built with… Read More +
Mastering Kali Linux for Advanced Penetration Testing will provide you with a number or proven techniques to defeat the latest defences on the networks using Kali Linux. From selecting the most… Read More +
In today’s world, value generation is more and more dependent on Information Technology. IT is susceptible to serious cyber threats and all enterprises need to address these with a high… Read More +
If you use a Smartphone, you’d be familiar with this. On an average, billions of mobile applications are downloaded every year by those who use smartphones. Be it Apple, Android… Read More +
While we have researched and documented many examples of hardware security issues with IoT devices, the most common source of IoT security flaws lies within the apps that are used… Read More +
I just wanted to give you an overview how one can be a Penetration Tester with a little guide on how to do Penetration Testing. I’m not gonna talk about… Read More +
Application Security testing is a broad and deep topic that few Testers or Developers ever master. Static and dynamic analysis vulnerability detection tools are proven to be appallingly inaccurate. Specialised… Read More +
This eBook extract from 'Effective Python Penetration Testing' will concentrate on Chapter 1: Python Scripting Essentials It will begin by providing you with an overview of Python scripting and penetration… Read More +
If you’re a web application functional tester, you’ve almost certainly used a proxy to test a few features. (If not, you should!) In this webinar, Paco will briefly show how… Read More +
Welcome back to Testing In the Pub. We’ve got a great interview to start our new season of podcasts. We talk to Declan O’Riordan about his 3 epiphanies of security… Read More +
Some security experts would tell you that security testing is very different from functional or non-functional software testing. They are wrong. Having worked on both sides, Paco gives 3 specific… Read More +
Are our systems secure? The short answer is "No“. Yes, SOME systems are secure, but most of them are not. My father remembers the time when people did not lock… Read More +
Icebergs can be deceptive when looked at! They encompass a huge mass below the sea level which is around 90 % of its actual size, leaving only 10 % for… Read More +
Wherever, whatever application store some data about sensitive information and interact with server using API methods, then it's possible for someone to possibly hack the data from API if you have… Read More +
Already this year the Identity Theft Resource Centre has reported 101 data breaches with over 80M records stolen. The US military Twitter account was recently hacked by terrorists. The Sony data breach… Read More +
With the advent of BYOD (Bring your own device), enterprises are adding time and resources to ensure they can get the maximum benefit from the personal devices that employees bring… Read More +
Passive testing resulted in several of my internet-facing projects receiving little regard to security other than the traditional access control matrix. Upon deciding to take a more assertive approach to… Read More +
A penetration testing expert is better at pen-testing than me, but should I simply delegate application security to specialists and network firewalls? Actually no, I shouldn’t and neither should anyone… Read More +
Welcome to Testing In The Pub, your regular podcast all about software testing. In this episode we talk to Dan Billing about security testing. This is part 1 of a… Read More +
I am currently working in Mobile Security Testing as a penetration tester. Before this I worked on software/web application development and when I tuned my career towards software/mobile app testing,… Read More +
By using this website you consent to our use of cookies. For more information on cookies see our Read MoreAccept
Privacy & Cookies
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.