Take some time away from your desk, grab a bite to eat, and explore what our authors have been covering in blog posts for the past week.

What Is Privacy by Design?

Millions of dollars go into securing the data and privacy of an organization. Still, malicious attacks, unnecessary third-party access, and other data security issues still prevail. While there is no definite way to completely get rid of such attacks, organizations must find more effective ways to fight these threats. One such method is called privacy by design. Learn all about privacy by design from Zulaikha Greer on Enov8’s blog.

Understandably enough, we want our databases to be fast. We want to select the most appropriate database for whatever we’re doing so that the queries we run will come back at speed. By changing the way we store data on computer memory, we can make certain types of queries return faster than others, which has a big impact on the database’s performance. These exchanges are important because we want the types of queries we run most frequently to be as quick as possible. Row- and column-oriented databases use different architecture methods to store data. The purpose of this post is to explain what row- and column-oriented databases are. Find out more from Alex Doukas on Scalyr’s blog.

How to Take a Screenshot in Selenium: A Walkthrough With Code

We also updated a couple of posts this week, like this one on Selenium. In manual testing, tests should be performed manually in every environment by testers who use different data sets, whereas in the case of automation testing, it’s done by a program. Automation testing is faster and needs less investment in human resources, and frequent execution of tests is possible. Selenium is one such tool that automates the testing of web applications for functional and regression test cases. In Selenium, you can locate the elements, perform actions, record test cases, etc. Taking screenshots at each step of the test process provides a visual record of the use case that can help in troubleshooting when the test fails. Find out more on Testim’s blog. 

What Is a Content Security Policy (CSP) and Why Is It Important?

Finally, we updated a post on CSP. A common attack vector against public websites is injecting content which claims to be from that website. In reality, it’s content that’s hosted elsewhere. Once it’s loaded and executed on a customer’s computer, it likely takes advantage of them in some way. Those attackers might use XSS attacks, injecting malicious iFrames or Clickjacking. Obviously, these kinds of attacks erode your customers’ trust in your organization. Those attacks often confuse them, which leads to abandoning a shopping cart or an uptick in support tickets. The monetary costs for these attacks have a real impact on your business. How does a content security policy help? Get the answer on Sqreen’s blog.