Tech Lead Journal cover image

#138 - Building Application Security Program - Derek Fisher

Tech Lead Journal

00:00

How to Securing the Development Lifecycle

Security can be done in a hundred different ways, and there can be any combination of tools. What is the business budget tolerance? And what is your risk as an organization? If you're a company that has no sensitive data, you are not processing credit cards. There's no sensitive information. The way I usually try to approach it is that think about what are you trying to discover? DAST or IAST, get a penetration test. Software composition analysis should always be integrated.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app