Subscribe
  • Top Reads
    • Top Reads issue 01
    • Top Reads issue 02
SecurityRoundtable.org POWERED BY: PALO ALTO NETWORKS
  • Cybersecurity
  • Risk management
  • GRC
  • Breach Planning
  • Around the Web
  • Cyber Reading

DevSecOps

Apr 16, 2019 / by Lucas Moody

Breach Planning, Cyber Resilience & Response, Cybersecurity, magazine, Quarterly Magazine, Risk management, Risk Management & Threat

Why Automation? Why Now?

Automation has always played a role in cybersecurity. If you think about basic antivirus software, it typically works …

Nov 26, 2018 / by Greg Day

Cybersecurity, Risk management

Yes, You Really Do Need DevSecOps

I recently read an interesting and insightful article on Security Roundtable written by Craig Templeton, CISO at REA Group, where …

Nov 13, 2018 / by Naveen Zutshi

The Evolving Relationship Between the CIO and CISO

Aug 21, 2018 / by Craig Templeton

Avoid Buzzwords: There Is No DevSecOps (Opinion)

Aug 8, 2018 / by Sam Greengard

Getting Out of Open Source Debt

cybersecurity risk management

Apr 6, 2018 / by Greg Day

It’s Time for a Change to Cybersecurity Consumption

Feb 12, 2018 / by Sam Greengard

DevOps Is Going Mainstream—What You Need to Know

Jan 17, 2018 / by www.forbes.com

Mitigate Digital Transformation Cybersecurity Risk With ‘D...

Security Roundtable
@SecurityRT

Most Popular

  • The Growing Role of Machine Learning in Cybersecurity
  • The Biggest Cybersecurity Risks in 2020
  • CISO reporting structure What’s The Best Reporting Structure for the CISO?
  • Ransomware Attacks Are You Protected Ransomware Attacks Are Up. Are You Prepared?
  • 3 Ways to Avoid Getting Phone Hacked
@SecurityRT
  • About us
  • Terms
  • Privacy
  • Contact
Powered by