How Testing can save Financial Applications from the next HACK

How Testing can save Financial Applications from the next HACK

On October 20, 2016, The Economic Times (Indian business daily) reported that ‘3.2 million debit cards may have been compromised in India’ as a result of a security breach. The breach allegedly originated in Hitachi Payment Services that enabled fraudsters to steal information and consequently funds. Startling incidents like these further establish the need for testing in the Financial/Banking sector.
Read More

The opinions expressed in this blog are author's and don't necessarily represent Gallop's positions, strategies or opinions.

Resilience is critical. How can Security Testing build it?

How can Security Testing build it?

What is ‘Pegasus’?

August 25, 2016 Apple rushed across to all iPhone users with a security update to prevent their handsets from getting infected by the ‘Pegasus’ spyware. ‘Pegasus’ has been considered by experts by far the ‘most sophisticated’ software created to infect and spy into smartphones. The software has been created by an Israeli company, the NSO Group to target Ahmed Mansoor, a prominent dissident in the United Arab Emirates.
Read More

The opinions expressed in this blog are author's and don't necessarily represent Gallop's positions, strategies or opinions.

Detecting Software Security issues before Hackers Strike

Detecting Software Security issues before Hackers Strike

In today’s connected IT world, the damage caused due to online security breach is well known. The brand and reputation of the enterprise is damaged if hackers gain access to corporate systems, and it also costs a lot of dollars in order to repair the damage caused. The consequences are similar for businesses dealing in creating embedded and mobile systems when their software are hacked.
Read More

The opinions expressed in this blog are author's and don't necessarily represent Gallop's positions, strategies or opinions.

10 Critical Activities to Test Security of Mobile Applications

10 Critical Activities to Test Security of Mobile Applications

3G and 4G network enabled smart phones are today being used more and more for accessing the Internet, for performing financial, business, and social transactions, and for media consumption. However, the safety of the data being consumed by the end user using the apps distributed via mobile application stores, poses a big security issue.
Read More

The opinions expressed in this blog are author's and don't necessarily represent Gallop's positions, strategies or opinions.

The Importance of changing QA mentality for Rich Internet Application (RIA) Security

The Importance of changing QA mentality for Rich Internet Application (RIA) Security

Rich Internet Applications (RIA) offer crisper desktop UI’s in comparison to traditional web apps. RIAs come with the frameworks such as Flash, Silverlight, Ajax etc. that allow developers to create incredibly responsive apps. The user does not have to wait for long server calls, which results in a smooth user experience that makes it seem to look like a desktop app, but with the low memory burden of a regular web app.
Read More

The opinions expressed in this blog are author's and don't necessarily represent Gallop's positions, strategies or opinions.