Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

What are the steps to secure application development?

What are the steps to secure application development?

FromExploring Information Security - Exploring Information Security


What are the steps to secure application development?

FromExploring Information Security - Exploring Information Security

ratings:
Length:
23 minutes
Released:
Jul 31, 2017
Format:
Podcast episode

Description

In this getting started episode of the Exploring Information Security podcast, Jim Manico joins me to discuss the steps (or rather phases) to secure application development.Jim (@manicode) is an active member in the application security field. He's been a board member for OWASP. He's a regular speaker at OWASP conferences and he provides appsec training nine months out of the year. I recently had the opportunity to tune into a webinar put on my Jim discussing the steps to secure application development. He's got a wealth of knowledge and provides actionable advice for anyone wanting to move in that direction.In this episode we discussHow Jim got started in appsecWhy secure application development is importantWhat the steps are to get startedWho should be implementing application security



[RSS Feed] [iTunes]
Released:
Jul 31, 2017
Format:
Podcast episode

Titles in the series (100)

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.