FMZ Quantfmzquant.hashnode.dev·Jun 19, 2024What are the elements of a complete strategy?Summary A complete strategy is actually a set of rules that traders give themselves. It includes all aspects of the trading, and does not leave a little room for subjective imagination. Every choices of buying and selling, the strategy will give an a...trading,
PavlinforQA Thingsqathings.com·Jan 21, 2024Risk-Based Testing: Prioritization Of Tests Based On Risk And CostIn the dynamic landscape of software development, ensuring quality is paramount. One effective strategy to achieve this is the Risk-Based Approach to Quality Assurance (QA). This approach involves prioritizing tests based on the severity of potential...Risk-Based Testing
Olamide Matthewtheolamide1.hashnode.dev·Sep 4, 2023The Concepts Of Vulnerability, Threat & Risk In CybersecurityThere is the need to understand the concepts of ‘VULNERABILITY, THREAT, AND RISK’ when trying to understand the nut and bolt of Cybersecurity. These three (3) concepts are fundamental but they’re often used interchangeably. Cybersecurity, like other ...#cybersecurity
EVENBOOKSevenbooks.hashnode.dev·Jul 7, 2023Don't Miss Out on the Best Opportunities: Make the Most of Your LifeLife is full of opportunities. Some are big, some are small, but all of them have the potential to change our lives for the better. The problem is, we often miss out on these opportunities because we're not paying attention, we're afraid to take risk...Networkingopportunities
Maxim Mozayevmikihaku.hashnode.dev·Jan 6, 2023Why cybersecurity failsIntro Even before the pandemic and challenges of remote work, the surge of cyberattacks, and overall surging uncertainty, cybersecurity management was considered a stressful job. Quite a few publications (e.g. [1], [2]) have appeared over the last co...51 reads#cybersecurity
John Vesterjohnjvester.hashnode.dev·Oct 10, 2022Creating a Risk-Aware Card ProgramAvid readers of my publications might recall my love of music and the Canadian power-trio Rush. When I focus on the recently-departed drummer of the band, I wonder “How did Neil Peart comprise solos, drum fills, and lyrics so melodically?” Then, I re...46 readsWeb Development
Maxwell Onyekamaxwellonyeka.hashnode.dev·Jul 21, 2022Alpha Recon: The solution to security risk managementEnterprise Security Risk Management (ESRM) is a strategic approach to security management that uses widely acknowledged risk management principles to link an organization's security practice to its overall strategy. With a focus on protective measure...26 readsSecurity
Elisabethnilokuma.hashnode.dev·Jul 19, 2022Writing a Risk Assessment Analysis ReportI recently ran a risk assessment analysis exercise with one of Blue Bear Inc's clients. I want to share here the way I approached the problem and how I structured my report. 1. Brainstorming risks Technical Risks It is impossible to identify all ris...81 readsrisk
Dan Abelengineeringandcareering.co.uk·Jun 27, 2022Prevent Software Disasters by asking ‘What if?’Software fails in production far more than it should - yielding to pressures of use, both intentional or accidental. Here's a product team game (and process) to help teams identify and avoid the disasters that might befall their product. If you want ...278 readsEngineeringsoftware development