|
A New Approach to IoT Safety, Risk, and Vulnerability Analysis
Slideshow
The ugly truth is that the interconnection of devices with IoT systems can lead to failures which result in physical injury, unacceptable risk, or cybersecurity vulnerabilities. Preventing such accidents requires identifying hazards, risks, and security vulnerabilities during development.
|
Gregory Pope
|
|
Managing Risk in an Agile World Most software projects take great pains to identify and mitigate risks. Traditional risk analysis techniques can be subjective, time-consuming, and complicated. All it takes is a simple spreadsheet.
|
|
|
Your Professional Responsibility for Security and Performance It is Johanna Rothman's belief that security and performance are no longer nonfunctional requirements in modern-day software development. Instead, we must prepare to accommodate security and performance needs in all projects.
|
|
|
Who Needs Standards, Anyway? Many CM experts are familiar with the guidance found in the IEEE, ISO, and ANSI/EIA industry standards. But if you want to really accelerate your agile development, it is wise to learn what is involved with implementing such industry standards. Bob Aiello explains the different types of standards and how organizations go about creating them.
|
|
|
The Lost Art of Change Control Change control exists to review and approve important modifications, but done wrong, you chance confusion, chaos, failures, and outages. Poorly run change control wastes everyone’s time, but far worse is the missed opportunity to assess and manage risk. Here, Bob Aiello gets you up to speed on the lost art of change control.
|
|
|
Are You Ready for Go-Live? 8 Essential Questions As real and daunting as scheduling pressures can be, they have to be balanced with the consequences of a potentially disastrous premature go-live. Don’t let all the reasons a system simply "must" be implemented by a target date overwhelm compelling evidence that it is not ready. Consider these eight questions honestly first.
|
|
|
Better Software Conference East 2014: Tips and Tricks for Building Secure Mobile Apps
Slideshow
Mobile application development is now a mission-critical component of many IT organizations. Due to the security threats associated with mobile devices, it is critical that mobile applications are built to be secure from the ground up. However, many application developers and testers do...
|
Jeff Payne, Coveros, Inc.
|
|
Privacy and Data Security: Minimizing Reputational and Legal Risks
Slideshow
Privacy and data security are hot topics among US state and federal regulators as well as plaintiffs’ lawyers. Companies experiencing data breaches have been fined millions of dollars, paid out millions in settlements, and spent just as much on breach remediation efforts. In the past...
|
Tatiana Melnik, Melnik Legal, PLCC
|
|
A Discussion on Data Encryption: An Interview with Kerry Cox Jr.
Podcast
Kerry Cox Jr. of Simplified Network Solutions talks about his recent work with Project Sierra, data encryption, the risks often overlooked in our ever-connected world, and how working for the government has helped to shape his career and views on the importance of Internet security.
|
|
|
The Power of an Individual Tester: The HealthCare.gov Experience
Video
Like millions of other Americans, Ben Simo visited HealthCare.gov in search of health insurance and found a frustratingly buggy website that was failing to fulfill its purpose―to educate people on the new health insurance law and help them purchase health insurance. After failing to create...
|
Ben Simo, eBay Inc.
|