How banks can security penetration test outsourced systems

By Dermot McGirr

Concerns outsource providers have about giving banks and other financial institutions the right to carry out security penetration testing on their systems can be allayed by institutions in a way which still enables them to meet their regulatory obligations. Institutions are required to ensure that they are able to carry out security penetration testing on outsourced service provider's systems under European Banking Authority (EBA) guidelines on outsourcing arrangements. It is one of the more challenging hurdles that institutions face when seeking to comply with the guidelines.

Read more

Why telemedicine's rise must lead to a remote testing revolution

By Hamish Grierson

The COVID-19 pandemic has proven the case for telemedicine, but if we are to see a proactive healthcare revolution then we must put remote testing firmly in the picture. The pandemic has irreversibly transformed society as we know it - breaking down the very fabric of the way we live, work and engage with each other, catapulting us into a deep and potentially long lasting economic recession, disrupting education and dramatically changing our perceptions of healthcare and how it should be delivered.

Read more


By Tammy Xu

Quality assurance has always been an important part of the software development process, but there are many ways of integrating QA into the development lifecycle. Some companies have centralized teams of QA engineers that handle testing for all software. Other companies embed QA testers within development teams. Still others have no QA testers at all.

Read more

Penetration testing in agile testing

By Drugeot

Penetration testing – or pen testing – is the practice of testing a computer system, network, or web application to find security vulnerabilities that can be exploited by an attacker. Penetration testing can either be automated with software applications or performed manually. It involves gathering information about the target before the test, identifying possible entry points, attempting to break in, and reporting back the findings.

Read more