Dev Box Testing is the first set of tests performed on the development engine before the code is sent to the repository for review. In this article, Jolivé has written about why Dev Box Testing is an interesting practice that you should adopt.
An increasing array of organizations now conduct penetration testing because of the increasing threat from real cyberattacks. In this article, the author has emphasized on the importance of penetration testing and has also advised how new organization’s can start with it.
Integrating cybersecurity assessments into the development process early so vulnerabilities can be discovered earlier refers to as a Shift-Left strategy. In this article, the author has written about what Shift-Left means for SaaS Companies and their customers.
Ethical Hacking has emerged and has opened many different avenues for IT and cyber security professionals. In this article, the author has given an overview of ‘Ethical Hacking’ and has listed 25+ websites where people can practice their skills.
Keeping yourself updated in your domain is extremely important in today’s world. In this article, Vikas has a compiled a list of 15 Cybersecurity Blogs that every Cybersecurity enthusiast must follow and read to keep themselves updated.
A bootcamp has a set curriculum and all the information is given to you and for some people it is easier to stick with something if they are financially invested in it. In this article, Justin has listed the top 5 QA/SDET Automation Bootcamps.
Test automation metrics seek to provide teams with insights about the test automation process. Every single KPI identified in this process offers teams crucial information. In this article, Chris has written about benefits of analyzing such metrics and also the challenges associated with them
API testing is critical for automation testing and the CI/CD process because it can cope with short release cycles and frequent changes. In this article, Manish has written about the importance of API Testing and why is it required.
The process of penetration testing can be a lot time consuming if done manually. This is where automated penetration testing tools come in. They automate the process of pentesting, making it easier and faster for you to find and fix vulnerabilities. This article lists the best Automated Penetration Testing Tools in 2022.
APIs are the heart of any backend application and Testing the same APIs again and again is tiring. In this article, Saloni has shared a solution for this and has demonstrated how you can automate API testing using Postman.
The HTTP 403 is an HTTP status code meaning access to the requested resource is forbidden. In this article, the author has demonstrated how he was able to bypass 403 forbidden domain using a simple trick.
In this article, Surendra has given an overview of Bug Bounty in 2022. He has written about the basic requirements before starting bug bounty, what users need to learn, and how to start doing bug bounty hunting in real world.
Like in any other field, Biases and prejudices can be very risky for Testing. It’s important to have a investigative attitude whenever you feel you are getting biased. In this article, Rahul has compiled a list of such questions that you can ask yourself to.
Thanks for reading!
Stay tuned for the next editions of our Trending in Testing Weekly Newsletters.