risk management | TechWell

risk management

Plane coming in for a landing, photo by Sebastian Grochowicz How Do We Land This Thing? Planning for Go-Live and Beyond

Some project managers have little experience bringing a project in for a landing, so they can be dismayed or just blindsided by organizational change needs and stakeholders’ expectations at delivery. Here is a checklist of some commonly forgotten items to address when a project goes live, so be sure to plan for them.

Payson Hall's picture
Payson Hall
Arrows pointing to old way and new way An Agile Approach to Change Management

Many organizations are reluctant to introduce new tools or technologies, or even to update existing ones. The reason is often framed in terms of risk management, but agile teams already have the tools to manage the risk of change: testing and experiments. These approaches together eliminate gaps in risk identification.

Steve Berczuk's picture
Steve Berczuk
Arrow expanding testing Continuous Exploratory Testing: Expanding Critical Testing across the Delivery Cycle

Continuous testing entails executing automated tests to obtain rapid feedback on business risks. Where does that leave exploratory testing? Obviously, it doesn’t make sense to repeat the same exploratory tests across and beyond a sprint, but exploratory testing can be a continuous part of each software delivery cycle.

Ingo Philipp's picture
Ingo Philipp
On-off switch Using Feature Flags to Boost Testing and Deployment

A feature flag is a configuration setting that lets you turn a given feature on or off. There is no need for a feature to be complete before you can start testing—as soon as the first piece of code is merged, you can turn the flag on in your test environment and begin. This also reduces risk. Do you use feature flags?

James Espie's picture
James Espie
Cyber security 4 Cyber-Security Actions to Protect from Attacks

With breaches and computer hacks, companies constantly need to keep information safe. If there are loopholes in your security process, you are putting your product—and customers—at risk. Here are four actions every security-conscious company and individual should implement to avoid becoming a victim of cyber attacks.

Ray Parker's picture
Ray Parker
Secure mobile app Insider Threats: What’s the Biggest IT Security Risk in Your Organization?

Any modern company should give the line-of-business teams the ability to provision self-service, on-demand resources, but to ensure security, you have to do so in a way that has the necessary monitoring built in via automation. One good way is to use a cloud management platform that helps you keep your app secure.

Pete Johnson's picture
Pete Johnson
Data analysis Data-Driven Testing Skills in an Agile and DevOps World

For agile and DevOps, an understanding of the role of data analysis in the test strategy is helping teams accelerate development, testing, and deployments. As we continue to enhance our testing effectiveness, data analytics skills are an important dimension in managing risks in a “continuous everything” world.

Michael Sowers's picture
Michael Sowers
Padlock Make Your Security Testing More Agile

Security practices traditionally have followed a waterfall model, adding security testing on at the end. Organizations need to coach their security programs and testers to prioritize analysis and risk, much like we do with agile stories, to better incorporate security defects with other feature work along the way.

Alan Crouch's picture
Alan Crouch