Remove How To Remove Information Security Remove Operating Systems Remove SDLC
article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

Dave Bittner: [00:06:50] And this realization across the industry that this is a better way to go than doing your security testing at the tail end, is that pretty much an accepted practice these days? David Brumley: [00:07:01] I think everyone accepts the notion, and they're trying to figure out how to implement it right now.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

Dave Bittner: [00:06:50] And this realization across the industry that this is a better way to go than doing your security testing at the tail end, is that pretty much an accepted practice these days? David Brumley: [00:07:01] I think everyone accepts the notion, and they're trying to figure out how to implement it right now.

article thumbnail

THE CYBERWIRE DAILY PODCAST EP. 389 WITH GUEST SPEAKER DAVID BRUMLEY

ForAllSecure

Dave Bittner: [00:06:50] And this realization across the industry that this is a better way to go than doing your security testing at the tail end, is that pretty much an accepted practice these days? David Brumley: [00:07:01] I think everyone accepts the notion, and they're trying to figure out how to implement it right now.