With RSA Conference about to convene, it’s a good time to think about the year (OK, this time it is 14 months) that has...
Hi, what are you looking for?
With RSA Conference about to convene, it’s a good time to think about the year (OK, this time it is 14 months) that has...
Did you know that 84% of all cyber attacks target applications, not networks? What’s even more curious is that 80% of Internet of Things...
The Software That Controls our Infrastructure is Vulnerable to Attack
After going through 24 seasons of cross-country, winter track, and spring track with my boys, I fully understand that if you put your toe...
Several recent cyber attacks have successfully targeted organizations that should be poster children for security hygiene. Why are even the most security-conscious organizations being...
We have collectively heard the saying, “where there is smoke, there is fire” throughout our lives. And, sure enough, it is true far more...
1. Shift Left. 2. Test earlier in the development cycle.
Worrisome Chicken Little or savvy observer of truth?
I recently had reason to spend an overnight visit in the hospital. When friends and family left me late in the evening I was...
Quality and security. Two words that share an interesting relationship and no small amount of confusion.
The prediction business is a tricky thing. You can be right, but until you are proven right, you’re either early or wrong. Being early...
For far too long software security has been comprised of a curious bifurcation of roles. Developers develop and IT security testers test for security...