- Get an accurate risk assessment when testing app security
- Protect against OWASP’s Internet of Things Top 10 (Part 2)
- Protect against OWASP’s Top 10 Internet of Things threats (Part 1)
- The Basics of Application Security Testing, Part 2: Types of Threats
- The Basics of Application Security Testing, Part 1: Concepts
- White-Box Testing vs. Penetration Testing vs. Fuzz Testing: Pros and Cons
- OWASP Privacy Risks: Operator-sided Data Leakage
- OWASP Top 10 privacy risks: Non-transparent Policies, Terms and Conditions
- Can ‘thinking like an animal’ solve security fears?
- Software Quality ZZZzzzzz…..Boring!
- Where’s the Luv?
- Volkswagen Emissions Software Scandal: Malware is the Car
- An Open Letter to Apple … from a PSC Summer Intern.
- Morning Commute Gone Wrong
- Is the Problem of Software Security Social or Technical?
- 1 Step Forward, 10 Steps Back in Cyber Security
- Featured Article on StickyMinds: Being the Devil’s Advocate for Software Quality
- #1 Way To Secure Your Software – [How to Herd Cats]
- A Hard Look in the Mirror
- Thanksgiving Dinner and Software Releases
- DRINKING THE AGILE MOVEMENT “KOOL-AID”
- What You Need to Know About Cyber Security From Your Plumber
- A True Warrior Poet
- Big Fish Choking On The Little Fish
- Software’s 500lb Marshmallow
- Executive Spotlight of the Month (DCG)
- It’s Not Who’s Right, But What’s Right
- Software Testing and the Fuzzy End of the Lollipop
- The Fox Guarding the Hen House
- Open Source Software – A Wolf in Sheep’s Clothing?
- SOFTWARE IS YOUR BRAND
- APP Security: New Year Resolutions & The Coming Holiday Hangover
- Software Politics and Tootsie Pops
- The Next Generation of Hackers?
- Is Your Software a Lamborghini or a Yugo?
- Check Your Software’s Cholesterol Level!
- Software Quality Management – tools management versus data management … that’s the question!
- Medical Devices Face Cyber Security Threats
- Is there any humanity in Cyber Crime?