You've requested...

Built-in Self-test (BIST) Using Boundary Scan

If a new window did not open, click here to view this asset.

Download this next:

A Computer Weekly buyer's guide to perimeterless network security

In this 15-page buyer’s guide, Computer Weekly looks at:

  • The expansion of boundaries of the digital workplace and the steps enterprises can take to implement a secure perimeterless digital workplace
  • Security without boarders and a way of securing each point of connectivity and every device
  • The break free from traditional network security and the assessment of how corporate networks are breaking out of their boundaries

These are also closely related to: "Built-in Self-test (BIST) Using Boundary Scan"

  • AI & the future of procurement

    With its capacity to transcend the boundaries of software, the significance of AI in procurement and supply chain technology is undeniable.

    But why should procurement and supply chain professionals adopt an AI-centric approach?

    Download this white paper to unlock 5 difference-making capabilities of AI that make it a necessity for the future of procurement:

    • Adeptness
    • Agility
    • Attention
    • And 2 more

  • A Computer Weekly eGuide to Workspaces

    In this eGuide we focus on all thing’s workspace related. We dive into Google’s new privacy settings, how the landscape of workspaces will look when the world of work fully returns and Google’s new G Suite workspace overhaul.

Find more content like what you just read:

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

    Download

  • Security outcomes for Zero Trust: Adoption, access, and automation trends

    Zero-trust security strategy should be securing access in a way that frustrates attackers and not users. Zero trust is not a new concept. But today’s rise in adoption reflects a fast-changing reality - boundaries that once existed to secure access to corporate data no longer exist. Learn about some secrets to success in this Cisco white paper.

    Download

  • Why you should have a disaster recovery testing plan in place

    With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.

    Download

  • Proving ownership of IPv6 addresses

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

    Download

  • Royal Holloway: Testing antivirus efficacy in Linux

    Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.

    Download

  • 6 key criteria for developer-first secrets scanning solutions

    Hardcoding secrets enables developers to seamlessly access or authenticate the services needed to build and deploy applications. But those secrets, if not stored securely, present a huge risk. This checklist presents 6 key criteria that you should use when evaluating a potential secrets-scanning solution. Download now to learn more.

    Download

  • Best practices for comprehensive file upload security

    Organizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.

    Download

  • Synthetic tumor data enhances training for cancer detection AI

    An artificial intelligence model trained solely on synthetic liver tumor data performed on par with models trained using images of real tumors.

    Download

  • What should you ask a pentesting service provider?

    To augment their security stances, many organizations have partnered with a penetration testing (pentesting) service provider. Is your business considering doing the same? Step in “11 Questions to Ask Your Pentesting Service Provider,” a white paper that can guide your market exploration. Read now to unlock insights.

    Download

  • Royal Holloway: Man proposes, fraud disposes

    In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.

    Download

  • Quick guide to strategic penetration testing

    This infographic explores how penetration testing can help businesses reduce costs, build trust and gain a competitive edge. Learn more about the benefits and stages of penetration testing by reading on.

    Download

  • Secure your apps by shifting left with Contrast

    Penetration tests can be expensive and time-consuming, an issue luxury car maker BMW realized very quickly when attempting to secure their massive number of apps. Discover how they were able to speed up their testing by shifting left with Contrast, which supports automated security tests throughout the entire software delivery lifecycle.

    Download

  • Publishing Test

    Publishing Test

    Download

  • PHC Test sessions res

    PHC Test sessions res

    Download

  • Penetration testing: Different types & how it works

    Many organizations that invested in web and mobile applications over the past few years were uneducated in the potential threats and failed to protect their end users from encountering availability and performance issues. Download this white paper to learn how it works and explore the different types of penetration testing.

    Download

  • Cloud leader’s guide to cloud testing

    In the eyes of many, cloud computing is now the backbone of modern business. Cloud testing can play a key role in safeguarding the cloud ecosystem. Read this blog article to learn more about cloud testing and why it matters.

    Download

  • Discover vulnerabilities & strengthen your security posture

    In this white paper, learn about how penetration testing can help you discover security weaknesses, evaluate response capabilities and get recommendations to strengthen your security posture.

    Download

  • Computer Weekly – 19 July 2016: Building big ideas in banking

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

    Download

  • Next-generation DAST: Introducing interactive application security testing (IAST)

    While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.

    Download

  • Independent analysis of Bitdefender GravityZone

    Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.

    Download

  • A thousand pen-testers, at your service

    Traditionally, manual penetration testing is a costly and unreliable endeavor. However, modern automated penetration testing platforms enable organizations to better understand their unique vulnerabilities, allowing them to stay ahead of tomorrow’s threats – read this data sheet to learn more.

    Download

  • IAST fact vs. fiction: Debunking 5 common myths

    While Interactive Application Security Testing (IAST) can help accelerate DevSecOps, some common misconceptions persist that can stymie even the most valiant of security testing efforts. This essential resource debunks 5 commonly-believed IAST myths.

    Download

  • Strengthen medical device cybersecurity with simulation technology

    Secure medical device development with simulation technology. Learn how to use penetration testing and fault injection to detect and mitigate cybersecurity vulnerabilities throughout the device lifecycle. Download the white paper to explore how simulation can strengthen your medical device cybersecurity.

    Download

  • The value of shift-left security testing in 2024

    Traditional security testing often comes too late, leaving customers vulnerable. Shift left security testing earlier in the SDLC can identify and fix vulnerabilities faster. Learn how to build an effective shift-left security testing strategy in this article.

    Download

  • SAST vs. IAST: Picking the Right Tool for the Job

    Watch this webinar for a demo of static application security testing (SAST) and interactive application security testing (IAST) solutions and determine which is the right tool for your needs.

    Download

  • Focus: Disaster recovery planning and virtualisation

    We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.

    Download

  • Expert insights: Threat intelligence & risk management

    To unlock insights about, and best practices for, threat intelligence and risk management from security experts at CyberMaxx, browse this blog.

    Download

  • Utilities optimize smart grids and meters with QA and testing

    Smart grids, smart meters, and microgrids are transforming the energy industry. Expert QA and testing are crucial to unlock their full potential. Learn how utilities can optimize these technologies through quality engineering in this blog.

    Download

  • Application security: best practices and risks

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

    Download

  • Flashlight on Shadow IT

    Shadow IT refers to the systems or applications that are used without the knowledge, or consent, of an organization’s IT department – leading to exposed sensitive information. Instead of implementing brand new tools, you can best leverage your existing tools. Read on to learn how to bring these tools together.

    Download

  • Managed testing services yield 40% savings for global FS leader

    This BFSI giant found their Agile transformation was faltering due to quality and agility issues. Qualitest's comprehensive Quality Engineering strategy delivered 40% cost savings, 85% defect reduction, and 3.6x defect detection improvement. Read the full case study to learn how.

    Download

  • Container Security 101

    Developers have widely embraced containers because they are designed to make building and deploying so-called cloud native applications simpler, but they also carry a range of cybersecurity issues. Download this e-book to learn how you can ensure security for these essential applications.

    Download

  • How to Successfully Migrate to Elastic Security for SIEM

    For organizations weighing their SIEM options, or who have already decided firmly on migrating to Elastic Security, this reference guide is for you. Access it here to gather a step-by-step approach for how to migrate to Elastic Security in the 41-page guide. Read it cover-to-cover or simply grab a copy to scan at your leisure.

    Download

  • CW ANZ, November 2018: Exploring blockchain

    Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.

    Download

  • Best practices for modern ransomware defense

    Ransomware attacks are resurging, and attackers are increasingly using AI to generate sophisticated phishing emails that evade detection. Download this white paper now to learn how you can leverage modern recovery tools to strengthen ransomware defense for your business and restore data in hours, not weeks.

    Download

  • Top developer security tools to consider

    This buyer's guide provides insights on selecting the right developer security tools for your organization. Discover the critical features and capabilities to consider when evaluating solutions. Read the full guide to make an informed buying decision.

    Download

  • Explore the benefits of Linux for medical device development

    Open source Linux is cost-effective and customizable for medical device development but presents security and compliance issues. Wind River Linux offers an advanced embedded platform with robust security, compliance support, and lifecycle management, aiding innovation and risk reduction in medical devices. Learn more in the full overview.

    Download

  • Putting NIS2 into Context: A Guide to Compliance

    The EU's updated cybersecurity legislation, NIS2, strengthens security requirements for critical infrastructure. Learn how the Sonatype platform can help organizations address NIS2 compliance challenges and enhance software development processes. Read the 7-page white paper.

    Download

  • Improving online order fulfillment and customer satisfaction

    This case study explores how Wiliot's Visibility Platform helped an online retailer reduce mis-shipments and increase customer satisfaction. By integrating IoT Pixels into shipping boxes, Wiliot provided real-time asset tracking, reducing lost/damaged packages by 60%. Learn more in the full case study.

    Download

  • Go from Analytics to Action with AI-Powered Intelligent Document Processing PEX Industry Report 2023

    In this eGuide, you will learn what IDP is, how it differs from earlier solutions and the role it plays in achieving operational excellence.

    Download

  • Is your campus prepared to respond to the demands of today?

    The pressure is on for colleges to modernize their IT infrastructure. Is your campus prepared to respond to the demands of today and the changes of the future? Browse this infographic to explore the current trends testing the IT backbones of many campuses.

    Download

  • Continuous testing: How a bank boosted software quality

    A leading bank was primarily practicing manual testing for its software delivery efforts, which lacked standardization and led to inconsistencies across locations. To alleviate these problems and enhance software quality, the bank decided to integrate continuous testing into its DevOps practices. Read on to learn why.

    Download

  • Quick guide to Interactive Application Security Testing (IAST)

    In the age of observability, Interactive Application Security Testing (IAST) has emerged as an essential security testing strategy. This resource examines how IAST helps observability of multiplying, complex apps, as well as the crucial role it plays in an effective security strategy.

    Download

  • Software supply chain security & the SOC: End-to-end security is key

    Check out this report to learn how a modern software security assurance strategy can bring the SOC into the loop of continuous integration/continuous deployment (CI/CD) software development and release cycles. In addition, the report outlines comprehensive software supply chain security best practices.

    Download

  • Data classification tools: What they do and who makes them

    Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.

    Download