Joshua Corman - The Internet of "Things". What are the implications?
Update: 2013-08-20
Description
The "Internet of Things" is of extreme concern now that virtually every device on earth is getting wired. What are the implications? In this wide ranging discussion, I talk with Joshua Corman about his project, the "Rugged Manifesto", and upping the ante on application security.
Highlights of our discussion
00:05 The history of the "Rugged Manifesto"
07:07 Who is part of the Rugged Movement
09:26 The patterns within DevOps
12:37 OWASP Top 10 - Go deep vs Go Long
16:40 A different approach to the OWASP Top 10
17:57 The most important factors in your ultimate application security yield
20:08 The problem with the "Internet of Things"
21:35 The agenda at Derby Con in Kentucky, September 2013
Blog: Cognitive Dissidence
Rugged Software Manifesto
About Joshua Corman
Hired to build and run a new team for Akamai called Security Intelligence - reporting to the CSO. Team will do research, analysis, thought leadership, work closely with high risk organizations and drive actionable intelligence into the public sector, government, and critical infrastructure. With almost a third of internet flowing through us, we intend to drive asymmetric gains to security - at a time when it is most needed.
Highlights of our discussion
00:05 The history of the "Rugged Manifesto"
07:07 Who is part of the Rugged Movement
09:26 The patterns within DevOps
12:37 OWASP Top 10 - Go deep vs Go Long
16:40 A different approach to the OWASP Top 10
17:57 The most important factors in your ultimate application security yield
20:08 The problem with the "Internet of Things"
21:35 The agenda at Derby Con in Kentucky, September 2013
Blog: Cognitive Dissidence
Rugged Software Manifesto
About Joshua Corman
Hired to build and run a new team for Akamai called Security Intelligence - reporting to the CSO. Team will do research, analysis, thought leadership, work closely with high risk organizations and drive actionable intelligence into the public sector, government, and critical infrastructure. With almost a third of internet flowing through us, we intend to drive asymmetric gains to security - at a time when it is most needed.
Comments
In Channel