Skip to main content

Chad Holmes

Posts by Chad Holmes
  • If You Got It (Security), Flaunt It.

    When selling software, whether to businesses or consumers, differentiation is the key to successfully marketing a product. Software providers can take a lesson from auto manufacturers and use safety and security to set their products apart. Differentiation Tips from the Detroit At their core, cars get you from point A to point B quickly and efficiently. Though, BMW Car Club members may disagree,… READ MORE

Stay up to date on Application Security

  • Prove it or Lose it! Enterprises Now Demanding Proof of Security From Their Software Suppliers

    It doesn’t matter which threat report you consult, the fact remains that the application layer is the most targeted and most vulnerable point of entry into an enterprise. The smart enterprises are taking security into their own hands by forcing their software suppliers to prove that they are taking appropriate measures to secure the software accessing the enterprise’s critical systems and data.… READ MORE

  • How Do You Influence the Security Posture of Your Business’s Third-party Applications?

    I recently came across an interesting blog post by a team member at Acunetix that addressed a challenge many enterprises are facing when it comes to securing third-party components. This is a pretty hot topic in certain circles these days, and understandably so - studies have suggested that as many as 65% of an enterprise’s mission critical applications are developed externally.… READ MORE

  • Webinar: The (In)Security of Vendor-Supplied Software

    Wednesday, April 17th - 1pm ET: Register Now! What vulnerabilities threaten the integrity of your software supply chain and data? Can your enterprise really influence software vendors to meet your most important security policies and remediate insecure software? Enterprises are taking on unbounded risk as a result of increased investment in outsourced, commercial, SaaS, mobile and open source… READ MORE

  • In Case You Haven’t Heard, These Cloud and Big Data Things are REALLY Cool

    Having spent the last 10 years or so working with technology on a day-to-day basis, I thought I’d seen a good deal of “Woah, that is cool” moments. These moments range from just discovering modern day technology (the fact that companies made billions on database software blew my much younger mind for about a week) to more niche discoveries (my first identified SQL Injection vulnerability was a… READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.