Michael Teeling is a software marketing veteran who has advised more than 50 companies on go-to-market strategy since 2001. He is an expert in content marketing, message strategy, brand identity, and reaching the key influencers that move technology markets. Mike founded Influential Strategies a decade ago and has represented numerous information security companies. Visit Mike’s blog.
Stay up to date on Application Security
- December 13, 2013 | By Michael Teeling
Program Levels 5 to 6 – from Improved to Optimized This is the final post in a series on the Application Program Maturity Curve. In this series, we’ve advocated that Application Security is best pursued as a sustained, policy-driven program that employs proactive, preventative methods to manage…Read Article
- November 8, 2013 | By Michael Teeling
Program Levels 1 to 2 – from Ad-Hoc to Blueprint This is post two in a series on the Application Program Maturity Curve, you can read the first post of this series here. As we’ve discussed, the program maturity model for Application Security has six levels. You should be able to recognize at which…Read Article
- October 23, 2013 | By Michael Teeling
About the Appsec Program Maturity Curve – a good model to follow… As information security professionals, we must pursue any opportunity to evolve our approach to application security. Most enterprises with in-house development teams do some kind of ad-hoc appsec testing, usually during the QA…Read Article
- May 14, 2012 | By Michael Teeling
Data integrity is a fundamental component of information security. In its broadest use, “data integrity” refers to the accuracy and consistency of data stored in a database, data warehouse, data mart or other construct. The term – Data Integrity - can be used to describe a state, a process or a…Read Article
Application Security Tool Kit
Love to learn about Application Security?
Get all the latest news, tips and articles delivered right to your inbox.
No thanks, back to the article please.