2012: The Year for Security Testing
Bangalore: When it comes to websites and applications which obtain critical information such as bank account number or credit card information, security testing is of utmost importance. The year 2012 has seen an increasing number of users using mobile devices specifically those that run on the android operating system. According to a report by Eset, in 2011 there were only 300 million people who used their smartphones for banking purposes and the number is increasing and Eset expects the number to touch 530 million in 2013. Further, cyber criminals are targeting the weakest links in an application. To ensure that these devices and applications are safe and secured, developers and testers spent a good quantity of their time on security testing in 2012. Suzanne Kattau on SD Times explained why developers and testers are engrossed with security testing in 2012.
According to Suzanne, “The cloud and its inherent multiple environments often left backdoors unintentionally open, which made them even more enticing to criminals. Because of this, software development managers had to begin testing their apps as thoroughly as IT tests its security infrastructure.”
Although 2012 is coming to an end, however, developers are still not doing enough to ensure that their applications are secure. Earlier this year, Veracode tested 9,910 applications and found that at least 8 out of 10 applications didn’t meet the security criteria. According to Forrester, the lack of security tools for developers is one of the many reasons why developers are not doing proper testing of their applications.
Many vendors came out with various tools to help developers find and fix bugs and other defects during development. Coverity in October this year unveiled its Next – Generation development testing platform which is an integrated suite of software testing technologies for identifying and remediating critical quality and security issues during development.
The BYOD trend is also increasing at a rapid rate and this trend ushered in many security concerns to business organizations. In a conference held in February this year, the hottest topic was the external devices that access the company’s internal networks.
Post your Comment
All form fields are required.