The Customer Screen That Said, "Booga! Booga!"
When software developers see security professionals come around, I almost get the sense that they start to avoid us as if we are a vacuum...
Beware of Pink Driveways
When approaching the challenge of how to leverage a small, and in some cases tiny, Information Security staff to reach all of the teams,...
Between a Rock and an Outsource Vendor
It is one thing to scrutinize 3rd party software development vendors on their security practices, selecting the best vendor. But what if...
Should Vulnerabilities be Treated as Defects?
Security functions within companies are usually their own organization that are for the most part outside of the development...
Personal Email, Devices, and Offices Often a Risk
Hillary Clinton's government email use and that of her staff touches on a widespread and larger issue in the business world: Employees...
A Trip to OZ: Security and the Affordable Care Act Website
This set of articles explores factors from a security perspective that contributed to the ACA (Affordable Care Act) website derailing in...