Opinionated Security

Friday, August 2, 2019

MOVED: The Application Security Novelty

This post has been moved to https://medium.com/@opinionatedsec/making-application-security-more-than-a-novelty-3aa1c0cf8420?sk=cae3b4ea0341dfe884a2cfc043290483

Follow me on Twitter for casual conversation and the latest blog updates: @Opinionatedsec1 

SEE ALSO

The Five Pillars of a Successful Application Security Program 

A Cyber Security Metaphor 

Why Operations Engineers Don't Always Transition Into Effective Cyber Security Practitioners
Posted by Opinionated Security at 7:53 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Application Security, Executives, Security Practitioners, Vulnerability Management

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Subscribe To My Blog

Posts
Atom
Posts
Comments
Atom
Comments

Pages

  • Why This Blog?

About Me

My photo
Opinionated Security
My name is Tony Grey and I fundamentally believe that it is possible to grow and retain a crazy good cyber security team. One that is the foundation for an equally good security program. I like to think that I set the direction and strategy for such a team that I built for a well known financial services company but that's for others to determine. Not me. As I talk with other cyber practitioners, I'm sensing a disconnect between security programs and executive teams. This blog exists to contribute in a very intentional and somewhat opinionated way to the conversation between security and execs to grow and resource the best kind of security program. The kind of program that influences the entire organization. All views and opinions here are mine and do not reflect the views of my current employer or previous employers. Reach me at opinionatedsec[at]gmail[[.]]com
View my complete profile

Blog Archive

  • ▼  2019 (154)
    • ►  December (21)
    • ►  November (30)
    • ►  October (30)
    • ►  September (29)
    • ▼  August (31)
      • The Cyber Maturity Audit Squeeze
      • A Cyber Security Mentoring Impression
      • The High Prioritization Simplification
      • An Application Security Defect Misunderstanding
      • The Vendor Best Practice Excuse
      • A Cyber Security Spend Alternative
      • Improving Cyber Security Program Predictability
      • The Application Security Thought Process
      • A Second Cyber Security Metaphor
      • A Legacy Infrastructure Security Swan Song
      • The Cyber Security Fear Factor
      • The Cyber Recruiting Value-Add
      • The Secure DevOps Edge
      • An Insufficient Cyber Resources Homework Assignment
      • An At Scale Cyber Tale
      • The Cyber Security Capability Building Gamble
      • A Cyber Security (Almost) Love Story
      • The Seven Incident Response Leadership Sins
      • The Magical Malware Deception
      • The Breach Sure Bet
      • The Cyber Threat Actor Miscommunication
      • MOVED: A Ransomware Popular Opinion Quandary
      • The Cyber Security Prioritization Mismatch
      • The Security Control Distraction
      • The Cloud Security Automation Realization
      • The Training Conference Underestimation
      • The Security Exception Ruse
      • MOVED: Cyber Security “A” Team Staffing Truisms
      • The Privileges Paradox
      • MOVED: The Application Security Novelty
      • The Vulnerability Management Fantasy
    • ►  July (13)
Simple theme. Powered by Blogger.