Secure SDLC Lessons Learned: #5 Personnel
February 26th, 2023 | 🕒
Convert Text to Speech In this blog series, I am discussing five secure software development lifecycle (SDLC) “lessons learned” from
February 26th, 2023 | 🕒
Convert Text to Speech In this blog series, I am discussing five secure software development lifecycle (SDLC) “lessons learned” from
February 26th, 2023 | 🕒
Text to Voice In this blog series, I am discussing five secure software development lifecycle (SDLC) “lessons learned” from Optiv’s
February 26th, 2023 | 🕒
Convert Text to Speech When it comes to fighting malware, combating nation-state threats, and securing digital assets, the information security
February 26th, 2023 | 🕒
iSpeech Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you
February 26th, 2023 | 🕒
iSpeech.org In this blog series, I am discussing five secure software development lifecycle (SDLC) “lessons learned” from Optiv’s application security
February 25th, 2023 | 🕒
iSpeech.org Introduction As part of Optiv’s application security practice, we spend a lot of time talking with clients about
February 25th, 2023 | 🕒
iSpeech In this blog series, I am discussing five secure software development lifecycle (SDLC) “lessons learned” from Optiv’s application security
February 23rd, 2023 | 🕒
iSpeech When discussing the topic of cyber threat intelligence, I frequently hear questions about Indicators of Compromise (IOCs). IOCs are
February 23rd, 2023 | 🕒
Powered by iSpeech A client for whom I serve as CISO advisor posed an interesting question to me last week,
February 23rd, 2023 | 🕒
iSpeech In part 1 of this blog series, I discussed the impact of credential theft on consumers and what they
February 22nd, 2023 | 🕒
Powered by iSpeech The primary purpose of the Optiv attack and penetration testing (A&P) team is to simulate adversarial threat
February 19th, 2023 | 🕒
iSpeech Pass-the-hash (PtH) is an all too common form of credentials attack, especially since the advent of a tool called
Gloss