Executive Women’s Forum on Information Security, Risk Management, and Privacy – The annual Women of Influence Awards recognize four women for their accomplishments and leadership roles in the fields of Information Security, Risk Management, and Privacy. Finalists were selected by a panel of judges from nominations submitted by the nominee’s peers.
SecurityWeek – The vote itself is delivered through electronic voting systems. These machines and their software tend to be old, unpatched, and easily hacked. The actual threat from hacked voting machines is, however, difficult to quantify.
Security Journey / Application Security Podcast – “We have a static analysis tool. Why do we need a program?” This is what Brook overheard at one point in his past, from a company CTO, and it sums up the program issue. The CTO was trying to drive a technical strategy for an entire company, and security was just one piece of that. A mandate or a tool would have made life so easy.
Embedded Computing Design – Imagine developing an automotive component for a major OEM. You might be making something as complex as an automatic lane-keeping system or something as small as a tire pressure monitor. But one thing that will be in common is that you will have no way to know all the permutations of vehicles and usages of your humble engineering effort.
TechCrunch – Security is everything — more so than ever in startup land. But with the constant pressures to launch and scale, how do you build a secure startup from the ground up without slowing growth?