top of page

BLOG
Search


Automation Testing - A changing trend and the next big thing in the field of testing
In this blog, we discuss about different types of testing, advantages of automation testing, and Introduction to Cyborg from Performetriks.
Sep 7, 20203 min read


The Value of Performance and Security
What is the real value of rich applications developed with performance and security in mind ,and why do we often realize far too late...
Aug 25, 20183 min read


Eliminate Security Issues from the Root
A massive proportion of our security issues are caused by Requirements which are incomplete Not enough knowledge on secure software...
Aug 17, 20181 min read


Performance and Security at the speed of DevOps
For many years, application performance and security were an afterthought. Developer focused on implementation of new features. Tester...
Jul 20, 20182 min read


Tips for Secure Software Development
Privacy is one of our valuable goods and attackers around the world have started to take this sensitive information away. Research has...
Jun 21, 20183 min read


GDRP is forcing Secure Software Development practices
General Data Protection Regulation (GDPR) will come into force on 25th May 2018. It applies to any organization that holds or processes...
Apr 27, 20181 min read


Application Security Testing Cheat Sheet
Recent attacks against major players in Telecommunication and Financial Services industries have shown that security is still a topic we...
Mar 22, 20181 min read


Will Patches for Spectre and Meltdown slow down Applications?
A few years ago, major CPU vulnerabilities have been identified. For some reason, nobody spends time on research in this area and tried...
Mar 15, 20182 min read


Performance Engineering Recommended Reading
There are many useful blogs which provide good insights about best practices in our performance engineering, testing and optimization...
Feb 16, 20181 min read


Performance & Application Security Testing Training
Project teams more and more realize that performance and security of their implemented applications is critical to their success. They...
Jan 28, 20181 min read


Meltdown CPU fix Saps Performance
The fix for a recent vulnerability in many Intel based CPUs will slow down applications by up to 50%.
Jan 18, 20181 min read


How do you Manage Security Risks in Open Source?
Open source is at the heart of almost every application. If you have ever developed a new application from scratch, the chance is very...
Apr 9, 20172 min read


Quick Start Guide for Security Tests
Software testers are sometimes unable to cope with the verification of security requirements because of their very technical nature. In...
Jan 30, 20172 min read


Quick Start Guide for Secure Software Development
Database access is a very attractive target of global cybersecurity attacks. Several big players have become a victory of...
Jan 23, 20172 min read


Why we need a Next Generation Technical Testing Platform
Our testing tool chain is quite impressive. Some are very specific, and others support a broad range of technologies and testing...
Jan 16, 20171 min read


Increase your Secure Software Development Maturity
Software development is often an unguided missile. Coding standards are seldom in place, and developers decide what framework and...
Jan 9, 20171 min read


Things you don’t want to hear about Development of Secure Software
Two of the three security breaches account for vulnerable applications. Cybercriminals use vulnerable business applications to get access...
Jan 2, 20171 min read


Application Security Antipatterns
Cybercrime is on the rise and in 3 of 4 security breaches, hackers target vulnerable applications instead of the backend infrastructures....
Nov 17, 20162 min read


NFR Testing should not be an afterthought
However, make testing of non-functional requirements, namely, security and performance testing, part of your development pipeline. Also,...
Nov 13, 20161 min read


Why you should start with Application Security Testing
There are different ways to ensure confidentiality, integrity, and availability of your business-critical information. Some of them...
Oct 30, 20161 min read
bottom of page