Chad Holmes

Posts by Chad Holmes

If You Got It (Security), Flaunt It.

July 30, 2013  | Security News

When selling software, whether to businesses or consumers, differentiation is the key to successfully marketing a product. Software providers can take a lesson from auto manufacturers and use safety and security to set their products apart. Differentiation Tips from the Detroit At their core, cars get you from point A to point B quickly and efficiently. Though, BMW Car Club members may disagree,... READ MORE

Prove it or Lose it! Enterprises Now Demanding Proof of Security From Their Software Suppliers

July 23, 2013

It doesn’t matter which threat report you consult, the fact remains that the application layer is the most targeted and most vulnerable point of entry into an enterprise. The smart enterprises are taking security into their own hands by forcing their software suppliers to prove that they are taking appropriate measures to secure the software accessing the enterprise’s critical systems and data.... READ MORE

How Do You Influence the Security Posture of Your Business’s Third-party Applications?

May 17, 2013

I recently came across an interesting blog post by a team member at Acunetix that addressed a challenge many enterprises are facing when it comes to securing third-party components. This is a pretty hot topic in certain circles these days, and understandably so - studies have suggested that as many as 65% of an enterprise’s mission critical applications are developed externally.... READ MORE

Webinar: The (In)Security of Vendor-Supplied Software

April 16, 2013

Wednesday, April 17th - 1pm ET: Register Now! What vulnerabilities threaten the integrity of your software supply chain and data? Can your enterprise really influence software vendors to meet your most important security policies and remediate insecure software? Enterprises are taking on unbounded risk as a result of increased investment in outsourced, commercial, SaaS, mobile and open source... READ MORE

In Case You Haven’t Heard, These Cloud and Big Data Things are REALLY Cool

November 20, 2012

Having spent the last 10 years or so working with technology on a day-to-day basis, I thought I’d seen a good deal of “Woah, that is cool” moments. These moments range from just discovering modern day technology (the fact that companies made billions on database software blew my much younger mind for about a week) to more niche discoveries (my first identified SQL Injection vulnerability was a... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu