![The Customer Screen That Said, "Booga! Booga!"​](https://static.wixstatic.com/media/4849f7_8359a147629b460aa9f4a38a16cf43e6~mv2.png/v1/fill/w_240,h_240,fp_0.50_0.50,q_95,enc_auto/4849f7_8359a147629b460aa9f4a38a16cf43e6~mv2.webp)
The Customer Screen That Said, "Booga! Booga!"​
When software developers see security professionals come around, I almost get the sense that they start to avoid us as if we are a vacuum...
![](https://static.wixstatic.com/media/4849f7_29ceca3cdf084d0599487fa95a58d65e.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/4849f7_29ceca3cdf084d0599487fa95a58d65e.webp)
![Beware of Pink Driveways](https://static.wixstatic.com/media/4849f7_29ceca3cdf084d0599487fa95a58d65e.jpg/v1/fill/w_278,h_240,fp_0.50_0.50,q_90,enc_auto/4849f7_29ceca3cdf084d0599487fa95a58d65e.webp)
Beware of Pink Driveways
When approaching the challenge of how to leverage a small, and in some cases tiny, Information Security staff to reach all of the teams,...
![](https://static.wixstatic.com/media/4849f7_f429197b97bb41aeaa04e91209f71d8b.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/4849f7_f429197b97bb41aeaa04e91209f71d8b.webp)
![Between a Rock and an Outsource Vendor](https://static.wixstatic.com/media/4849f7_f429197b97bb41aeaa04e91209f71d8b.jpg/v1/fill/w_311,h_212,fp_0.50_0.50,q_90,enc_auto/4849f7_f429197b97bb41aeaa04e91209f71d8b.webp)
Between a Rock and an Outsource Vendor
It is one thing to scrutinize 3rd party software development vendors on their security practices, selecting the best vendor. But what if...
![](https://static.wixstatic.com/media/4849f7_cde1b9904d76474487a3a5073756fdaf.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/4849f7_cde1b9904d76474487a3a5073756fdaf.webp)
![Should Vulnerabilities be Treated as Defects?](https://static.wixstatic.com/media/4849f7_cde1b9904d76474487a3a5073756fdaf.jpg/v1/fill/w_213,h_211,fp_0.50_0.50,q_90,enc_auto/4849f7_cde1b9904d76474487a3a5073756fdaf.webp)
Should Vulnerabilities be Treated as Defects?
Security functions within companies are usually their own organization that are for the most part outside of the development...
![](https://static.wixstatic.com/media/4849f7_f6bdc210fb064a41bc1a52705ef2fb83~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4849f7_f6bdc210fb064a41bc1a52705ef2fb83~mv2.webp)
![Personal Email, Devices, and Offices Often a Risk](https://static.wixstatic.com/media/4849f7_f6bdc210fb064a41bc1a52705ef2fb83~mv2.jpg/v1/fill/w_319,h_240,fp_0.50_0.50,q_90,enc_auto/4849f7_f6bdc210fb064a41bc1a52705ef2fb83~mv2.webp)
Personal Email, Devices, and Offices Often a Risk
Hillary Clinton's government email use and that of her staff touches on a widespread and larger issue in the business world: Employees...
![](https://static.wixstatic.com/media/4849f7_99cf12dc98ab4f3fb0f996b3e16001e7.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4849f7_99cf12dc98ab4f3fb0f996b3e16001e7.webp)
![A Trip to OZ: Security and the Affordable Care Act Website](https://static.wixstatic.com/media/4849f7_99cf12dc98ab4f3fb0f996b3e16001e7.jpg/v1/fill/w_319,h_240,fp_0.50_0.50,q_90,enc_auto/4849f7_99cf12dc98ab4f3fb0f996b3e16001e7.webp)
A Trip to OZ: Security and the Affordable Care Act Website
This set of articles explores factors from a security perspective that contributed to the ACA (Affordable Care Act) website derailing in...