19 10, 2016

Change the Incentive Model, Change the Culture

By |2019-11-18T09:12:25-08:00October 19th, 2016|Categories: Articles, DevSecOps, Tips & Tricks|Tags: , , |

It's imperative that all security conversations start not with technical issues, but instead with an understanding of the context for those issues, and the incentive models and org culture against which they're (mis)aligned. This is why our Lean Security model is about business transformation rather than being yet another IT [...]

18 10, 2016

How To Talk About Security With Every C-Suite Member

By |2016-10-31T22:14:22-07:00October 18th, 2016|Categories: Articles, Tips & Tricks|Tags: , , , , , |

Image via Pixabay.com Communicating with C-Suite leaders about the ongoing security threats your company faces can easily turn into an exercise in futility. Their eyes glaze over as you present metrics and charts that illustrate the current state of the business’s IT infrastructure, and your attempts to justify [...]

3 08, 2016

Why a global threat sharing program is vital to protect global infrastructure

By |2019-10-22T14:14:05-07:00August 3rd, 2016|Categories: Articles, Tips & Tricks|Tags: , , , , , , |

Image via Pixabay.com We live in a time where the global sharing of threat intelligence is not only possible; it’s vital to the security of our global infrastructure, and the public and private sectors have been working tirelessly to create these programs. So far, the biggest challenges have revolved around [...]

1 08, 2016

When It Comes to Security, Simplified Engineering Is Better

By |2019-11-18T09:13:29-08:00August 1st, 2016|Categories: Articles, Tips & Tricks|Tags: , , , , , , |

Image via Pixabay.com I grew up surrounded by art, and over the years, I’ve grown to appreciate the fact that beautiful paintings come in many different forms. This is especially true when it comes to abstract art. At one end of the spectrum, you can find a Mark [...]

24 06, 2016

Secure Your Startup Against Phishers With These 3 Tips

By |2019-11-18T09:13:58-08:00June 24th, 2016|Categories: Articles, Tips & Tricks|Tags: , , , , , |

Phishers -- unscrupulous Internet lurkers who try to get your username, password, credit card number and other sensitive information by posing as trusted sources -- know there’s a big pool of money out there. And, more often than not, to get it, all they need to do is cast a [...]

7 03, 2016

Why DevOps Needs Security

By |2019-11-18T09:14:49-08:00March 7th, 2016|Categories: Articles, DevSecOps, Tips & Tricks|Tags: , , , , , |

Why DevOps Needs Security DevOps done right must include an information security component. Countless surveys, studies and presentations continue to demonstrate the value of DevOps. I recognize that the road to DevOps for some organizations is tough. Dealing with cultural changes, new sets of tools and processes can easily overwhelm. However, failing to equally recognize the [...]

Load More Posts
Go to Top