security | TechWell

security

Person holding a credit card and accessing a secure blockchain How Blockchain Technology Will Disrupt Business

The security factor has made blockchain popular in finance applications—indeed, it's probably known best as the record-keeping technology behind bitcoin. But there’s more to its prospects than finance. Blockchain stands to be a disruptor in the business world because it has potential applications in so many fields.

Slava Vaniukov's picture
Slava Vaniukov
Person holding a sparkler with New Year's fireworks in the background Top 10 TechWell Insights Stories of 2019

Career development was on many software practitioners' minds in 2019, as some of our top stories were about having a technical lead on a Scrum team and making the switch from quality assurance to quality engineering. Stories about new ideas such as DevOps and continuous testing also ranked high. Check out the roundup.

Beth Romanik's picture
Beth Romanik
Broken pastel sticks Security Testing: A Constructive Mindset with a Destructive Approach

A typical tester mimics end-users, who are constructive when exploring an application’s functionality. But the role of a security tester is different. Their focus is mainly on mimicking hackers, who are intentionally destructive. A solid security strategy should balance both constructive and destructive efforts.

Rajini  Padmanaban's picture
Rajini Padmanaban
SecOps team member touching a security icon on a screen 5 SecOps Challenges and How to Overcome Them

SecOps, or security operations, is a collaboration between information security and IT operations to keep a company’s data secure and reduce risk, all while maintaining agile timelines. But it can be difficult to start. Here are five challenges you should address to ensure your SecOps implementation is successful.

Gilad David Maayan's picture
Gilad David Maayan
Shachar Schiff Security Testing and Assessing Risk: A Slack Takeover with Shachar Schiff

Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. Shachar Schiff, founder and principal consultant at BadTesting, hosted this Slack takeover and discussed assessing code coverage like a risk analyst, risk assessments outside security, and more.

Kelly McGee's picture
Kelly McGee
Person holding a smartphone showing mobile apps Security Tips for App Development

When companies develop applications they consider competitors and the market, but the most important aspect is cybersecurity. Developers need to release apps that don’t put consumers or their data in danger. Here are five tips that app developers should keep in mind to create and maintain the most secure apps possible.

Aimee Laurence's picture
Aimee Laurence
Encrypted data on a screen The Importance of Data Encryption in Cybersecurity

Encryption protects private data with unique codes that scramble the data and make it impossible for intruders to read. Despite a data breach, encryption ensures that an institution’s private data is safe, even when attackers get past the firewall. Here are four reasons to use data encryption cybersecurity measures.

Dylan Menders's picture
Dylan Menders
Stacy Kirk DevOps Transformations for QA Teams: A Slack Takeover with Stacy Kirk

Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. QA architect an agile coach Stacy Kirk, founder of QualityWorks Consulting Group LLC and nodeqa.io, hosted this Slack takeover and discussed improving teams by implementing DevOps practices.

Kelly McGee's picture
Kelly McGee