Insight for
Security Leaders

Articles tagged with "CISO"

Credit: Joe Basirico

Phase One of Appsec Engineering: Awareness

This is part of a series

  • Introduction
  • Awareness (you are here)
  • Enablement (coming soon)
  • Enforcement (coming soon)

Last week I published a post introducing three important phases of AppSec Engineering: Awareness, Enablement, and Enforcement. Over the next three posts I will dive into each of these topics to share best practices and guidelines you can roll out to optimize your security engineering practice.

In my experience, the best AppSec programs start with AppSec awareness training. The goal is to provide your product team with enough information to know when they need security involvement. That’s a broad statement, so let’s break it down.


Read more >>

Credit: Joe Basirico

The Three Phases of Appsec Engineering

This is part of a series

In order for an AppSec team to collaborate effectively with development teams they should think in three phases: Awareness, Enablement, and Enforcement. This month I’ll be dedicating an article to each. The focus of these articles will be on the critically important area of application security, focused on the roles involved in building software: developers (DevOps), testers, and architects.


Read more >>

Credit: Joe Basirico & Rob Curran
Credit: Pexels

How to Scale an Application Security Program - Part Two

In my last blog post, I wrote about what an application security program is and why it matters. In this post, I’ll cover what it takes to build and scale an effective application security program. 

I’ve seen many different ways that a well-intentioned program can fail to meet its objectives. While there may be many ways to fail, there are just a few key characteristics that lead to success.

The program must be:


Read more >>

Credit: Pexels
Credit: Joe Basirico (cc attribution)
Credit: Dane Deaner on Unsplash

Security Takes Commitment

In my last  post , I talked about the fact that none of us knows how to solve the problem of cybersecurity. It’s a tautology, so it shouldn’t be surprising. If we knew how to solve the problem, the problem would be solved. Therefore we don’t know how to solve the problem. 

But it is surprising, and so it feels like a ‘hard truth’ rather than ‘the truth’.

When confronted with a long-standing problem (like cybersecurity), it is typical to assume that if we had more will, more resources, more intelligence, or perhaps more of all of the above, we could solve the problem. We don’t stop to think about the fact that if what we are doing isn’t working, doing more of that same thing probably isn’t going to change the situation. It can be tough to admit when we don’t know what we are doing.


Read more >>