Insight for
Security Leaders

Articles tagged with "Guidance"

Credit: Photo by Eric Prouzet

140,000 People Have Been Laid Off, What’s Next

A hiring manager and a recruiter’s guide to getting hired.

This post is a collaboration between me, Joe Basirico, and one of the best tech recruiters in the industry, Ellen McGarrity. You can learn more about Joe on this website. Throughout you can read Ellen’s take, in her own words in blue text

Ellen has spent her 18-year career focused on recruiting in the software tech industry at both large (Microsoft, Amazon, Salesforce) and small (Tableau, Highspot) companies. She has recruited candidates at all levels, domestically and internationally. Originally based out of Seattle, she now lives in the Bay Area with her husband and 2 daughters.


Read more >>

Credit: Patrick Tomasso @ Unsplash
Credit: Daniel McCullough @ Unsplash
Credit: Barry Weatherall @ Unsplash
Credit: Joe Basirico

Phase One of Appsec Engineering: Awareness

This is part of a series

  • Introduction
  • Awareness (you are here)
  • Enablement (coming soon)
  • Enforcement (coming soon)

Last week I published a post introducing three important phases of AppSec Engineering: Awareness, Enablement, and Enforcement. Over the next three posts I will dive into each of these topics to share best practices and guidelines you can roll out to optimize your security engineering practice.

In my experience, the best AppSec programs start with AppSec awareness training. The goal is to provide your product team with enough information to know when they need security involvement. That’s a broad statement, so let’s break it down.


Read more >>

Credit: Joe Basirico

The Three Phases of Appsec Engineering

This is part of a series

In order for an AppSec team to collaborate effectively with development teams they should think in three phases: Awareness, Enablement, and Enforcement. This month I’ll be dedicating an article to each. The focus of these articles will be on the critically important area of application security, focused on the roles involved in building software: developers (DevOps), testers, and architects.


Read more >>

Credit: Alan Bishop @ unsplash
Credit: Joe Basirico
Credit: Visual Cinnamon & NY Times

You Have an Obligation to Fight for Privacy

Note: The header image was created by Visual Cinnamon for The New York Times on an opinion piece on digital trackers.

By now everyone is familiar and desensitized to cookie popups that bombard us on our first visit to almost every. These cookie consent alerts are there for a reason, they are required by new legislation such as GDPR and the California CPA. This legislation has been introduced to try to protect consumers from boundless data collection policies , which is a laudable goal. I’m not certain how much of a difference it’s made though as most users accept the terms as quickly as a EULA or a Windows Security Warning popup. Recently Senator Sherrod Brown has realized this and is trying to shift the burden of privacy from consumers onto the companies that hold the data. No longer will it be enough for a company to fall back on the “but you clicked on the Privacy Policy button” defense:


Read more >>

Credit: Pexels

How to Scale an Application Security Program - Part Two

In my last blog post, I wrote about what an application security program is and why it matters. In this post, I’ll cover what it takes to build and scale an effective application security program. 

I’ve seen many different ways that a well-intentioned program can fail to meet its objectives. While there may be many ways to fail, there are just a few key characteristics that lead to success.

The program must be:


Read more >>

Credit: Pexels
Credit: Kroll Historical Maps