28 03, 2019

Unpacking Lean Security

By |2020-07-22T10:42:20-07:00March 28th, 2019|Categories: DevSecOps|Tags: , |

New Context was founded in 2013 with the vision to keep the connected world safe and the mission to use Lean Security™ to automate the orchestration, governance and protection of critical infrastructure. Since then, we have been serving Fortune 500 companies and government entities by building [...]

21 12, 2018

LS/IQ: Lean Security Intelligence

By |2019-10-31T15:40:04-07:00December 21st, 2018|Categories: LS/IQ|Tags: , |

LS/IQ is a software solution based on New Context’s engagements with highly regulated customers. LS/IQ is for businesses to understand their security posture, adapt and maintain data security and compliance. Based on continuous improvement, LS/IQ captures company and employee data using self assessment survey and integration [...]

18 01, 2017

“Minimum Viable” MUST Include Security

By |2019-11-18T09:11:47-08:00January 18th, 2017|Categories: DevSecOps|Tags: , , , , |

If you're a startup trying to get a product off the ground, you've probably been told to build an "MVP" - a minimum viable product - as promoted by the Lean Startup methodology. This translates into products being rapidly developed with the least number of features necessary to make an initial sale [...]

26 07, 2016

New Context Appoints Noted Chief Architect Herb Kelsey as Chief Technology Officer

By |2016-10-24T19:43:24-07:00July 26th, 2016|Categories: News & Press Releases|Tags: , , , |

SAN FRANCISCO--(BUSINESS WIRE)--New Context, the leading provider of Lean Security for software and infrastructure development, today announced that the company has appointed Herb Kelsey as chief technology officer, where he will help New Context and its clients build, scale and architect the most advanced data solutions for critical infrastructure. “New [...]

24 07, 2015

Start integrating security into the software development pipeline

By |2019-11-18T09:16:50-08:00July 24th, 2015|Categories: DevSecOps, Secure Software Development|Tags: , , , , , , , |

All business leaders are faced with an ever growing list of challenges. Those of us who manage teams of software developers struggle with our own set of difficulties. The drums beat for us to address the unknown threats from Cyber Security risk while also developing and delivering software faster and [...]

3 07, 2015

Writing security acceptance criteria into an Agile story

By |2019-11-18T09:17:03-08:00July 3rd, 2015|Categories: DevSecOps|Tags: , , , |

When development groups write Agile user stories for development it should include security in the acceptance criteria or the definition of done. DevSecOps is the evolution of the DevOps philosophy. It is a concept that injects security into the software development lifecycle. Many people refer to this [...]

22 01, 2015

Security Should Be the Top Driver for DevOps

By |2019-11-18T09:19:36-08:00January 22nd, 2015|Categories: DevSecOps|Tags: , , , , , , , |

Barrier to Entry (2006) by Tom Page https://www.flickr.com/photos/tompagenet/318656457 I’ve often said that the driving factor for many companies in adopting a comprehensive information security program are the dreaded “F” and “A” words - FUD and Audit. Technically FUD is an acronym for fear, uncertainty and doubt. And it [...]

Go to Top