How to Build a Blueprint for Secure Software (eBook)

How to Build a Blueprint for Secure Software (eBook)

The evidence is in the news: Threat actors are taking constant advantage of weakly secured applications. Dan Shugrue of discusses how to secure applications from the start by creating a new blueprint for developing secure software.

In this interview with Information Security Media Group, Shugrue discusses:

  • How threat actors are exploiting unsecured software;
  • How we make exploitation too easy for the adversaries;
  • How a Protection Blueprint can change the tide.

Shugrue has over 20 years of experience working in security and communications technology. Prior to, he worked at Microsoft, where he led product marketing for confidential computing, a security technology that protects data in use. He has worked at security startups and spent five years as director of security product marketing at Akamai. To learn more, visit the solution page.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.