Alternative Search Engine

Security Think Tank: Enable outcomes-based security in software development

https://www.computerweekly.com/opinion/Security-Think-Tank-Enable-outcomes-based-security-in-software-development
See More From: computerweekly.com   ( Internet & Websites )

Oct 8, 2018 1:16 AM 6+ mon ago

Security Think Tank: Enable outcomes-based security in software development

Front-line operational security will always require a tick box element to ensure everyone is synchronised and singing from the same cyber security hymn sheet. Those on the front line cannot afford to experiment, as any failure could be potentially catastrophic for their organisation. Tried-and-tested formulaic solutions offer a readily available resolution in an emergency, whereas individual innovation is risky and cannot be relied on for operational security.

However, behind the front lines of cyber security, there is room to move towards a more creative, results-driven approach. The software production lines that lie behind our economy are the perfect place for this.

From crowdsourcing penetration testers, to developing a base of core competencies which form a springboard for innovation, to marrying creativity with compliance, there are abundant ways to move towards outcome-based security. Software developers also have room to fail forward ...

Read More

Security Think Tank: C-suite needs to drive outcomes-based security

computerweekly.com     6+ mon ago

Everywhere you look, there are articles saying that security is a c-suite issue. Sadly, it seems the only people who do not realise that are members of the c-suite. The upper echelon of businesses nee...

Security Think Tank: How to manage software vulnerabilities

computerweekly.com     7+ mon ago

Follow: Software vulnerabilities continue to be discovered on a daily basis, and it can often be a race against the hacker to apply relevant updates and remediate a vulnerability bef...

Security Think Tank: How to achieve software hygiene

computerweekly.com     7+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: A risk-based approach to security outsourcing

computerweekly.com     8+ mon ago

...

Security Think Tank: No shortcuts to addressing software vulnerabilities

computerweekly.com     7+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Eight controls to manage software vulnerabilities

computerweekly.com     7+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Balancing cost and risk in software vulnerability management

computerweekly.com     7+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Adopt a proactive approach to software vulnerabilities

computerweekly.com     7+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Situational awareness underpins effective security

computerweekly.com     4+ mon ago

Security Think Tank: Situational awareness underpins effective security As attackers begin to use multiple command and control systems to communicate with backdoors and oth...

Security Think Tank: Outsource security operations, not control

computerweekly.com     8+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Security Think Tank: Top things to consider in security outsourcing

computerweekly.com     8+ mon ago

Security Think Tank: Top things to consider in security outsourcing What critical security controls can be outsourced, and how do organisations SMEs in particular maintain confidence that they...

Security Think Tank: Follow good practice to reduce risk of software vulnerabilities

computerweekly.com     7+ mon ago

This email address doesn t appear to be valid. This email address is already registered. Please login. ...

Outcomes-based security is the way forward

computerweekly.com     7+ mon ago

...

Start outcomes-based security with asset identification

computerweekly.com     6+ mon ago

For example, we were once approached to provide a basic IDS [intrusion detection system] service so an organisation could "tick the network monitoring box". It should be as cheap as possible with mini...

Security Think Tank: Focus on security before app deployment

computerweekly.com     5+ mon ago

In the rush to deploy applications, security becomes an afterthought and is largely ignored when it really matters most - during the software development process. From a purely financial point of vie...

Security Think Tank: Put collaboration on 2019 security agenda

computerweekly.com     4+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. In the 12 years that Threat Horizon has been published, many of the predicted threa...

Security Think Tank: Align security strategy to business objectives

computerweekly.com     4+ mon ago

Security Think Tank: Align security strategy to business objectives At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 ...

Security Think Tank: A three-pronged approach to application security

computerweekly.com     5+ mon ago

In October 2018, an article in Computer Weekly noted that "Most organisations (67%) believe hackers can still penetrate their network and 89% say they have had an application layer attack in the past ...

Security Think Tank: Defend application layer with good security hygiene

computerweekly.com     5+ mon ago

As soon as you allow an application through your firewall, there is a possibility of a layer attack on it. Of course, we have to let applications through firewalls to do business - to allow remote use...

Security Think Tank: Firms neglect DNS security at their peril

computerweekly.com     4+ mon ago

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. Enter command and control (C&C) communications, the mechanism by which malware can ...

Security Think Tank: Prioritise multifactor authentication in 2019

computerweekly.com     4+ mon ago

One thing predicted for 2018 that did not happen We predicted that attackers might target cyber insurance firms to learn who had pay-out policy coverage in order to...

Search Builder

(Click to add to search box)
software developers  software developers need  software development team  iterations Software developers  core competencies  compliance solutions  software security  testing regime  penetration testing  pen testers  cyber attack  software development  end product  box element  mass market  cyber security  security solutions  
**Content contained on this site is provided on an “as is” basis. 4Internet, LLC makes no commitments regarding the content and does not review it, so don't assume that it's been reviewed. What you see here may not be accurate and should not be relied upon. The content does not necessarily represent the views and opinions of 4Internet, LLC. You use this service and everything you see here at your own risk. Content displayed may be subject to copyright. Content is removed on a case by case basis. To request that content be removed, contact us using the following form: Contact Us.