Rosie Sherry
CEO & Founder at Ministry of Testing
She/Her
I am Open to Speak, Meet at MoTaCon 2026, Write, Mentor, CV Reviews, Podcasting, Teach

I've been working in the software testing and quality engineering space since the year 2000 whilst also combining it with my love for education and community. It turns out quality, community and education go nicely hand in hand.

๐ŸŽ“ MoT-STEC qualified

Team Account Member
MoTaverse Team
Chapter Lead

Achievements

TestBash Trailblazer
Club Explorer
Bio Builder
Career Champion
Avid Reader
Article Maven
Testing Scholar
MoT Community Certificate
MoT Software Testing Essentials Certificate
MoT Advanced Certificate in Test Automation
Insights Spotter Bronze
Insights Spotter Silver
99 Second Speaker
The Testing Planet Contributor
Chapter Lead
MoT Streak
Unlimited Member
In the Loop
Collection Curator
Glossary Contributor
Meme Maker
Photo Historian
TestBash Brighton 2025 Attendee
TestBash Brighton 2024 Attendee
Cert Shaper
Author Debut
Lead with quality
99 and Counting
TWiQ Host
Chapter Event Speaker
Pride Supporter
Meme Machine
Inclusive Companion
Social Connector
Open to Opportunities
Found at 404
Picture Perfect
Story Sharer
Leading with Quality 2025 Attendee
Neurodiversity Matters
Everyday security testing: A practical guide to getting started
Kind Click
Supportive Clicker
Encouragement Giver
Encouragement Champion
Goal Setter
Insights Taster
Into the MoTaverse
Chapter Discovery
Call for Insights
Moment Maker
Moment Sharer
Moment Documenter
Moment Maven
Chapter Event Host
AMA Initiate
AMA Trailblazer

Certificates

MoT Software Testing Essentials Certificate image
Awarded for: Passing the exam with a score of 100%
MoT Community Certificate image
Awarded for: Achieving one or more Community Stars in five or more unique months

Activity

Whatโ€™s a red flag for hiring a software tester? image
Whatโ€™s a red flag for hiring a software tester?
Whatโ€™s a red flag for hiring a software tester? image
Whatโ€™s a red flag for hiring a software tester?
The write way towards professional development image
The write way towards professional development
The write way towards professional development image
The write way towards professional development
Rosie Sherry
Rosie Sherry
thanked contributors on:
The write way towards professional development image
Also, prompt your way to MoTaCon ๐Ÿ––

Contributions

The write way towards professional development image
  • Rosie Sherry's profile image
Also, prompt your way to MoTaCon ๐Ÿ––
Who owns the space between design intent and built reality? image
Matthias writes about design and engineering as one, (it's a great read) and how in 1898, Frederick Winslow Taylor's answer to inefficiency was to separate the work that people did. Those who did t...
Vulnpocalypse image
  • Rosie Sherry's profile image
Vulnpocalypse the moment when language models can find zero-days and write working exploits faster than we can patch them.
Vulnpocalypse image
  • Rosie Sherry's profile image
Vulnpocalypse. We use it to describe the inflection point where LLMs are able to discover zero day vulnerabilities, and create zero day exploits, faster than we can patch.
Zero-day attack image
  • Rosie Sherry's profile image
An active and high-severity, real-world attack that deploys a zero-day exploit against targets before a patch is available. Because no fix exists, standard defences such as software updates offer no protection. Zero-day attacks are particularly dangerous in critical infrastructure, government systems, and enterprise environments. State-sponsored actors using the browser exploit to silently install surveillance software on journalists' devices, undetected, and with no defence available to victims, constitutes a zero-day attack.
Zero-day exploit image
  • Rosie Sherry's profile image
Code or a technique that weaponises a zero-day vulnerability which turns a theoretical flaw into a working attack. Exploits may be developed by security researchers, government agencies, or criminal groups, and can be sold or traded on grey and black markets for significant sums. A piece of malware that takes advantage of the unpatched browser bug, silently executing code when a user visits a page, is a zero-day exploit.
Zero days image
  • Rosie Sherry's profile image
Zero days is a colloquial term for the window of time between when a software vulnerability is first discovered and when a patch is issued, during which defenders have had zero days to respond. The phrase is used loosely to refer to the category of threats, exploits, and attacks that exploit previously unknown flaws. Often used as shorthand: "The breach used a zero day" means the attacker leveraged an unknown, unpatched flaw.
Login or sign up to create your own MoT page.
Subscribe to our newsletter