hgoslin@veracode.com (hgoslin), Author at Security Boulevard
Live From RSAC: Disinformation: As Dangerous as Cyber and Physical Threats

Live From RSAC: Disinformation: As Dangerous as Cyber and Physical Threats

In today???s digital world, we practically live on our phones or computers. Chances are, you don???t go more than 15 minutes without checking your email or social media. And you probably get most of your news from the Internet. But how do you know what information is real? Two different ... Read More
Live From RSAC: AppSec’s Future and the Rise of the Chief Product Security Officer

Live From RSAC: AppSec’s Future and the Rise of the Chief Product Security Officer

Chris Wysopal, Co-Founder and CTO at Veracode, and Joshua Corman, Chief Strategist of Healthcare and COVID at CISA, presented at the 2021 RSA Conference on AppSec???s future and the need for a new Chief Product Security Officer (CPSO) role. Wysopal started by quoting entrepreneur Marc Andreessen saying, ???Software is eating ... Read More
Live From RSAC: Is Digital Transformation Making AppSec Headless?

Live From RSAC: Is Digital Transformation Making AppSec Headless?

Chris Wysopal, Veracode Co-Founder and CTO, recently sat down with Tom Field, ISMG Senior Vice President of Editorial, for an executive interview at the RSA Conference 2021 to discuss if digital transformations are making application security (AppSec) ???headless.??? Headless AppSec is an interesting concept. AppSec was traditionally part of the ... Read More
2021 Verizon Data Breach Investigations Report Proves That Cybercrime Continued to Thrive During the Pandemic

2021 Verizon Data Breach Investigations Report Proves That Cybercrime Continued to Thrive During the Pandemic

Verizon recently published its 2021 Data Breach Investigations Report (DBIR). This year, Verizon analyzed 79,635 incidents, of which 29,207 met their quality standards and 5,258 were confirmed data breaches, from 88 countries around the world. Despite the global pandemic, the DBIR uncovered that cybercrime continued to thrive. Like previous years, ... Read More
Developer Training Checklist: 5 Best Practices

Developer Training Checklist: 5 Best Practices

The role of the developer has evolved over the past several years. Developers are not only responsible for writing code and releasing new software rapidly but also for securing code. By implementing security in the software development lifecycle, you can reduce risk and cost without slowing down time to production ... Read More
Practical Steps for Fixing Flaws and Creating Fewer Vulnerabilities

Practical Steps for Fixing Flaws and Creating Fewer Vulnerabilities

All security flaws should be fixed, right? In an ideal world, yes, all security flaws should be fixed as soon as they???re discovered. But for most organizations, fixing all security flaws isn???t feasible. A practical step your organization can ??? and should ??? take is to prioritize which flaws should ... Read More
The First Step to Achieving DevSecOps Is Shifting Security Culture Left

The First Step to Achieving DevSecOps Is Shifting Security Culture Left

To achieve DevSecOps you need to shift security left. Sounds simple, right? Well, it???s easier said than done. A recent survey conducted by SANS Institute found that 74 percent of organizations are deploying software changes more than once per month ??? an increase in velocity of nearly 14 percent over ... Read More
DevSecOps and the Cloud: How Leaning on Your Cloud Provider Can Help You Shift Left

DevSecOps and the Cloud: How Leaning on Your Cloud Provider Can Help You Shift Left

Over the past several years, an increasing amount of organizations have been moving their applications from on-premises to cloud-hosted platforms. And with the current pandemic forcing most businesses to adopt a fully remote work environment, the cloud is even more appealing. Gartner reported that cloud spend rose by double digits ... Read More
Technology Companies Have the Largest Proportion of Applications With High-Severity Flaws

Technology Companies Have the Largest Proportion of Applications With High-Severity Flaws

As a result of the worldwide pandemic, technology companies were forced to pivot to fully remote operations.ツ?For many organizations, this meant accelerating their digital transformation efforts. But despite the investment in digital transformation efforts, there haven???t been enough investments in security measures. Our recent State of Software Security v11 (SOSS) ... Read More
Manufacturing Has the Lowest Percentage of High-Severity Flaws but Needs to Improve Time to Remediation

Manufacturing Has the Lowest Percentage of High-Severity Flaws but Needs to Improve Time to Remediation

The past 12 months have been especially challenging for the manufacturing industry. The pandemic affected in-person manufacturing jobs as well as supply and demand, causing many manufacturing companies to shut their doors or lay off valuable employees. Recognizing the vulnerable state of manufacturing companies, cybercriminals saw manufacturing as an easy ... Read More