Using the Threat Modeling Manifesto to Get Your Team Going

Secure software development requires a ‘shift left’ — paying attention to security and privacy early in the life cycle. Threat modeling is a very useful activity for achieving this goal, but for a variety of reasons, organizations struggle to introduce it. Last year, a group of industry and academy experts got together with the goal […]

The post Using the Threat Modeling Manifesto to Get Your Team Going appeared first on Security Intelligence.

Continue reading Using the Threat Modeling Manifesto to Get Your Team Going

Scaling Security in Software Development: The Art of Possible

What are the options for an organization that wants to take security in software development seriously? Here’s what to know.

The post Scaling Security in Software Development: The Art of Possible appeared first on Security Intelligence.

Continue reading Scaling Security in Software Development: The Art of Possible

Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design

When developing and deploying internet of things solutions, achieving security by design is not as simple as picking a secure development life cycle (SDLC) framework and shifting your security left.

The post Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design appeared first on Security Intelligence.

Continue reading Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design