Introducing Selenified

Selenified is the re-branded, updated, and patched software version of the software previously called the SecureCI™ Testing Framework. The Selenified Test Framework provides mechanisms for simply testing applications at multiple tiers while easily integrating into DevOps build environments. Selenified provides traceable reporting for both web and API testing, wraps and extends Selenium calls to more […]

Read more
Lightweight Text Editors — Ignite Talk

In my latest Ignite Talk, I (quickly) discuss some lightweight text editors. There are appearances from Visual Studio Code, of course Vim, and some others. Given this is an Ignite Talk, I don’t get to cover any one editor in depth. An Ignite Talk consists of 20 slides auto-advancing every 15 seconds. This was given […]

Read more
Finally A Good, Free Sequence Diagram Tool

Sequence Diagrams Often it is helpful to visualize a solution before implementing it. Diagrams in general help simplify a complicated system to make it easier to understand at a high level. One specific way you might accomplish this is with a sequence diagram. A sequence diagram shows how pieces of a system interact and in […]

Read more
Finicity API Review
Finicity API

Background Finance and accounting are only two of a great number of fields that are increasingly dependent on the Internet. The idea of using the web to do personal finance emerged a few years back. Tools like Quicken and Mint allow the end-users to simply link their bank accounts and pull transactions from those accounts, which […]

Read more
Automated Test Case Best Practices

I frequently talk about best practices when writing test cases in the Mobile Application Testing Course that I teach. I recently ran into an issue on a project and figured it was worth throwing this information out for all to share. Test cases are great; obviously, they’re important to have, whether they’re automated or manual, as […]

Read more
Security Scanning in Non-Standard Applications with Burp Macros: Performing the Scan
Burp Suite

DISCLAIMER: Only perform security testing on applications which you have explicit permission to do so. Also, this post shows features for Burp Suite Professional, as the Macros and scanning features are not available without a license. In the previous blog post, I detailed configuring Burp Suite for usage in security testing. Please reference the material […]

Read more
Getting Up and Running with Sonatype Lifecycle

It has become standard practice for modern software development organizations to integrate open source components into their products, as it enables them to leverage existing solutions and technologies, thereby avoiding the need to reinvent the wheel. In fact, open source repositories like Maven Central are reporting record increases in downloads annually (30 Billion in 2015, […]

Read more
2017 Q1 SecureCI™ Release
Security

I know what you’re thinking…what happened to the 2016 release? Well, 2016 was an interesting year, and unfortunately we weren’t able to get out a mid-year release, and our Q4 release got pushed to Q1 of this year. But, finally, an updated version of SecureCI™ is here! So, what can you expect from this release? Upgrades First and […]

Read more
Sonatype’s New Nexus Lifecycle Helps Teams Migrate Open Source Libraries
Sonatype Lifecycle

For a variety of reasons, a lot of companies are moving to an Agile, DevOps Culture, Continuous Integration and Delivery/Deployment (CI/CD) model. These transformations rely on a variety of tools, including open source. A lot of organizations also use open source tools and libraries to develop their applications and in order to ensure security, these […]

Read more
Security Scanning in non-Standard Applications with Burp Macros: Setup
Security

DISCLAIMER: Only perform security testing on applications which you have explicit permission to do so. Also, this post shows features for Burp Suite Professional, as Macros and scanning are not available without a license. Identifying the Target Many web applications are unique and apply complexity which defeats basic security scanning. This can come in the […]

Read more
X