Application Security , DevSecOps , Next-Generation Technologies & Secure Development

How to Build a Blueprint for Secure Software

Digital.ai's Dan Shugrue on Building Security Into Application Development
Dan Shugrue, security product marketing, Digital.ai

The evidence is in the news: Threat actors are taking constant advantage of weakly secured applications. Dan Shugrue of Digital.ai discusses how to secure applications from the start by creating a new blueprint for developing secure software.

In this video interview with Information Security Media Group, Shugrue discusses:

  • How threat actors are exploiting unsecured software;
  • How we make exploitation too easy for the adversaries;
  • How a Protection Blueprint can change the tide.

Shugrue has over 20 years of experience working in security and communications technology. Prior to Digital.ai, he worked at Microsoft, where he led product marketing for confidential computing, a security technology that protects data in use. He has worked at security startups and spent five years as director of security product marketing at Akamai. To learn more, visit the Digital.ai solution page.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.