28 01, 2021

Tech Startups: Add These Product Security Features Right Now

By |2021-01-29T08:53:30-08:00January 28th, 2021|Categories: DevSecOps, LS/IQ, Secure Software Development, Virtual CISO|

Our LS/IQ virtual CISO customers often struggle to balance making new features instead of spending time building security features. Engineering managers in small tech companies always prefer to sit down and code the next big thing to sell their product. Adding security controls early in a [...]

13 10, 2020

How to Create a Digital Transformation Roadmap to Success

By |2020-10-13T10:33:09-07:00October 13th, 2020|Categories: Blog, DevSecOps, Secure Software Development|

The digital transformation roadmap needs to center on alignment and integration. All stakeholders need to be aligned to the same goal. All technologies require integration to minimize the number of rollouts necessary. Many leaders take a piecemeal approach that results in a segmented program. This can create holes, especially when [...]

30 10, 2019

How to Prepare for the CyberSecurity Maturity Model Certification (CMMC)

By |2019-11-08T11:26:49-08:00October 30th, 2019|Categories: Secure Software Development|Tags: , |

Earlier this year, the Department of Defense (DoD) announced the development and enforcement of new cyber security compliance requirements to be eligible for DoD contracts. Because the upcoming requirements affect so many companies (large and small) as well as prime and subcontractors, many organizations are looking for answers. Here [...]

18 08, 2019

4 Tips for Building Secure Software

By |2019-11-18T09:30:24-08:00August 18th, 2019|Categories: DevSecOps, Secure Software Development|Tags: , , |

Software doesn’t write security in by itself; it takes best practices and intent to write good secure software. The industry is starting to agree on this, and the talk by Kelly Shortridge and Dr. Nicole Forsgren at Blackhat 2019 about bringing InfoSec and DevOps together is a great addition [...]

12 02, 2019

Security Automation in OT Networks

By |2019-10-31T15:19:09-07:00February 12th, 2019|Categories: Secure Compliant Data Platform, Secure Software Development|Tags: , , , |

Last week at DistribuTECH 2019, I had the opportunity to participate in a panel discussion on How AI and Machine-to-Machine Learning Are Enabling Cybersecurity Threat Intelligence. I was joined by fellow members of the California Energy Systems for the 21st Century (CES-21) program. Over the past 4 years, [...]

28 11, 2018

3 Key InfoSec things to do before the end of the year

By |2019-10-31T10:58:20-07:00November 28th, 2018|Categories: Secure Software Development, Tips & Tricks|Tags: , , , , , |

Thanksgiving in the US is passed and year end is in sight. As the end of the calendar year draws near, let's consider a few short term objectives you can complete right now that will have a long lasting effect on your security programs in 2019. 1. [...]

22 08, 2018

How the Software Bill of Materials will Advance Secure Software Development.

By |2019-10-31T10:59:19-07:00August 22nd, 2018|Categories: Secure Software Development|Tags: , , , , |

Allan Friedman’s vision of the SBOM is Kubrickian indeed. Stanley Kubrick made films that looked with deep introspection into the future of our society, often as a polite and sometimes troubling warning of things to come. Like Kubrick, the cybersecurity expert Allan Friedman is calling attention to how [...]

24 07, 2018

Innovation and competitive advantage are directly linked to how organizations protect customer data

By |2019-10-31T15:51:02-07:00July 24th, 2018|Categories: Secure Software Development|

Although the big push around GDPR data management is (mostly) behind us, our customers are finding regulatory compliance will slow innovation if it's not a strategic priority. Everyone in the C-suite wants to do more with their data. They want to stream every byte through their tensorflow oracles [...]

24 07, 2015

Start integrating security into the software development pipeline

By |2019-11-18T09:16:50-08:00July 24th, 2015|Categories: DevSecOps, Secure Software Development|Tags: , , , , , , , |

All business leaders are faced with an ever growing list of challenges. Those of us who manage teams of software developers struggle with our own set of difficulties. The drums beat for us to address the unknown threats from Cyber Security risk while also developing and delivering software faster and [...]

Go to Top