Michael Teeling

Michael Teeling

Michael Teeling is a software marketing veteran who has advised more than 50 companies on go-to-market strategy since 2001. He is an expert in content marketing, message strategy, brand identity, and reaching the key influencers that move technology markets. Mike founded Influential Strategies a decade ago and has represented numerous information security companies. Visit Mike’s blog.

Stay up to date on Application Security

Posts by Michael Teeling
  • The AppSec Program Maturity Curve 4 of 4
    December 13, 2013 | By Michael Teeling

    Program Levels 5 to 6 – from Improved to Optimized This is the final post in a series on the Application Program Maturity Curve. In this series, we’ve advocated that Application Security is best pursued as a sustained, policy-driven program that employs proactive, preventative methods to manage…

    Read Article
  • The Appsec Program Maturity Curve 2 of 4
    November 8, 2013 | By Michael Teeling

    Program Levels 1 to 2 – from Ad-Hoc to Blueprint This is post two in a series on the Application Program Maturity Curve, you can read the first post of this series here. As we’ve discussed, the program maturity model for Application Security has six levels. You should be able to recognize at which…

    Read Article
  • The Appsec Program Maturity Curve 1 of 4
    October 23, 2013 | By Michael Teeling

      About the Appsec Program Maturity Curve – a good model to follow… As information security professionals, we must pursue any opportunity to evolve our approach to application security. Most enterprises with in-house development teams do some kind of ad-hoc appsec testing, usually during the QA…

    Read Article
  • What is Data Integrity? Learn How to…
    May 14, 2012 | By Michael Teeling

    Data integrity is a fundamental component of information security. In its broadest use, “data integrity” refers to the accuracy and consistency of data stored in a database, data warehouse, data mart or other construct. The term – Data Integrity - can be used to describe a state, a process or a…

    Read Article

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.