<!-- THEME DEBUG -->
<!-- THEME HOOK: 'views_view_field' -->
<!-- BEGIN OUTPUT from 'core/modules/views/templates/views-view-field.html.twig' -->
Doug Bonderud
<!-- END OUTPUT from 'core/modules/views/templates/views-view-field.html.twig' -->

Doug Bonderud

Doug Bonderud is a freelance writer passionate about the evolution of technology and its impact on companies, stakeholders and end-users alike. Want to know more? Follow Doug on Twitter.

Stay up to date on Application Security

Posts by Doug Bonderud
  • How AppSec Fits into an Information…
    January 28, 2016 | By  Doug Bonderud

    Want a better information security program? Most companies do and are willing to spend big money on safeguarding critical systems. As noted by Infosecurity Magazine, Allied Market Research predicts huge growth in the hardware encryption market, with a CAGR of more than 50 percent and a net value of…

    Read Article
  • For CISO Evolution, the Three Cs Are Key
    August 4, 2015 | By  Doug Bonderud

    Data breaches are on the rise. According to a recent Forbes article, more than 675 million records were compromised last year. What's more, these breaches weren't limited to a single sector: retail, financial and even post-secondary institutions were all victimized. That means IT security must…

    Read Article
  • Vendor Management: 5 Best Practices for…
    June 24, 2015 | By  Doug Bonderud

    Third-party software can be problematic. Just ask American Airlines, which recently experienced an issue with its iPad-based electronic flight bags. A misconfiguration in third-party mapping software caused the devices to crash when pilots tried to access a specific map, in turn delaying flights…

    Read Article
  • Application Threat Modeling: The…
    March 18, 2015 | By  Doug Bonderud

    Cisco's annual security report, as highlighted on RCRWireless, indicates that new IT security threats are emerging. The highlights? "Snowshoe spam," which diffuses attacks over hundreds of IP addresses so as not to attract attention, is on the upswing, along with new web exploit kits such as those…

    Read Article
  • The New SDLC: Test Early, Test Often,…
    February 4, 2015 | By  Doug Bonderud

    It is six times as expensive to fix an app vulnerability in production than to fix one in development, according to a recent Veracode webinar. This shouldn't come as a surprise: developers test for functional and performance bugs early in the in the Software Development Life Cycle (SDLC). So it…

    Read Article
  • Baked-in Coding Standards Give Rise to…
    January 13, 2015 | By  Doug Bonderud

    If software composition analysis is the key ingredient in your application development recipe, coding standards will make it rise. When baked into every step of the agile development process, they give you a leg up on functionality, testing and — perhaps most importantly — security. With too many…

    Read Article

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.

Subscribe Now!

Product Videos