Joseph Feiman

Joseph Feiman

Joseph Feiman is Chief Innovation Officer at Veracode. In this role, Joseph is responsible for advanced technologies that drive innovative detection and protection strategies. Joseph is a recognized industry leader with nearly two decades’ experience in application development and security, analyzing the market for Gartner Research.

Stay up to date on Application Security

Posts by Joseph Feiman
  • Critical Capabilities that DevSecOps…
    | By Joseph Feiman

    As we outlined in a previous blog post, security technologies, in order to fit DevOps and other agile development processes, should be at the fingertips of Dev and Ops professionals. Yet, neither group is necessarily proficient in security, security is not their priority, and security tools are…

    Read Article
     
  • How to Evaluate and Select Application…
    | By Joseph Feiman

    The application security testing (AST) market is getting crowded. In addition, many of the vendors offer multiple technologies, and are promising even more advanced technologies in the near future. Some deliver technologies as tools, some as services. And these technologies are all priced…

    Read Article
     
  • The Gap Between Development and…
    | By Joseph Feiman

    All too often, application development professionals believe that application security is not their responsibility. To make matters worse, this belief is shared by their managers and CIOs, and reinforced by organizational structures and job descriptions. When asked about application security,…

    Read Article
     
  • Why RASP does not negate the need for…
    | By Joseph Feiman

    When one calls a technology “transformational” as I have with RASP, there are expectations that this technology will change the direction of a market. The market expects the solution to address a serious problem in such a way that the problem is made much smaller. One misconception is that…

    Read Article
     
  • What is real-time security and why it…
    | By Joseph Feiman

    Application security has emerged, evolved, matured and adopted at the programming and testing phases of application lifecycle, not at its operation phase. Technologies for application protection at the operation phase have been…

    Read Article