Evan Oslick works with businesses to create software assurance programs, perform security reviews, and develop software to streamline business processes. Evan has created several software assurance programs from scratch and been involved with many large scale assessment deployment efforts.
- Vulnerability Management: The Art of Cleaning Up ThreatsOctober 29, 2015 | Managing AppSec
A security organization has set up threat modeling. They have implemented static, interactive and dynamic application security testing. All of them are reporting vulnerabilities. What happens next? How does an organization handle all these findings? Vulnerability management is the process of categorizing and remediating threats, and this process needs to be a collaboration between software… READ MORE
Stay up to date on Application Security
- SDLC Best Practices: 5 Ways to Bridge the Application Security Gap
The biggest challenge for organizations trying to deliver secure applications is integrating application security within the entire software development lifecycle (SDLC). The SANS "2015 State of Application Security" report released in May shows this gap between builders and defenders is closing, however. By implementing the following five SDLC best practices as presented in the report,… READ MORE
- Software Security Assurance Requires Relationships
Any successful engineering endeavor requires a strong relationship between engineers and clients. Similarly, the success of a software security assurance program hinges on a key relationship: one between security and software engineering teams. Software engineering teams are under a significant amount of stress. There are constant struggles for power, competing requirements to address, most lack… READ MORE
A successful data breach response plan starts with identifying the teams (both internal and external) responsible for handling a response, finalizing communication plans and rehearsing the process. When it comes time to act, it's imperative everyone is able to remain focused, react quickly and adhere to the following five steps: 1. Isolate the Impacted System(s) System isolation is beneficial in… READ MORE
Application Security Tool Kit
Love to learn about Application Security?
Get all the latest news, tips and articles delivered right to your inbox.
No thanks, back to the article please.