Software Integrity Blog

Author Archive

David Harvey

dharvey

David Harvey, CISSP is a principal consultant with Synopsys. David evaluates agile practices, leads code reviews, and trains developers on defensive coding and threat modeling. Prior to joining Synopsys, he worked for UnitedHealth Group where he co-founded and led a developer-facing software security initiative. David has also worked as an architect and developer at Siemens, Boeing, and Unisys. He learned about software security when the ‘information superhighway’ was just becoming a thing and Fortune 20 companies were starting to bear the brunt of unsanitary design and coding practices that had been de rigueur in the old, segregated, safe ‘client-server’ or ‘feudal’ deployment models.


Posts by David Harvey:

 

Is threat modeling compatible with Agile and DevSecOps?

Bryan Sullivan, a Security Program Manager at Microsoft, called threat modeling a “cornerstone of the SDL” during a Black Hat Conference presentation. He calls it a ‘cornerstone’ because a properly executed threat model:

Continue Reading...

Posted in Agile, CI/CD & DevOps | Comments Off on Is threat modeling compatible with Agile and DevSecOps?

 

How to overcome common software security training hurdles

Software security training is an important part of software development. In the latest Ponemon study on data breaches, training and awareness programs are the number one control implemented after a data breach. However, as with any security control, it’s possible to incorrectly implement training. Within this post, I’ll discuss several common software security training hurdles that organizations often experience, and explore how to prevent and/or overcome these problems.

Continue Reading...

Posted in Data Breach Security, Security Training & Awareness | Comments Off on How to overcome common software security training hurdles

 

Benefits of application security training: Moving beyond compliance

The official organizational response to a data breach almost always includes the statement: “We met all regulatory and legal requirements for data protection.” Training is required for many compliance regimes, and it might just be good enough as a compliance control. However, as a security control it’s inadequate. There are multiple major retailers that were fully compliant with regulations, and yet they suffered massive breaches. Major health insurance giants were also fully compliant with HIPAA at the time of a breach exposing the “protected” sensitive information of millions.

Continue Reading...

Posted in Data Breach Security, Security Training & Awareness, Software Security Program | Comments Off on Benefits of application security training: Moving beyond compliance

 

The IRS data breach: How not to do identity proofing

We discuss the shortcomings of the IRS’s Get Transcript service, especially identity proofing, and how these widespread attacks could have been prevented.

Continue Reading...

Posted in Data Breach Security, Software Architecture & Design | Comments Off on The IRS data breach: How not to do identity proofing

 

How to create an effective software security training program for agile teams

Agile is a great innovation in software development. The agile focus on stakeholder involvement end-to-end, transparency and short delivery cycles are changes for the better for our industry. However, just-in-time nature of requirements, bug and flaw triage in agile makes it all the more critical that everyone on the team has a certain level of security knowledge.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Security Training & Awareness, Software Architecture & Design, Static Analysis (SAST) | Comments Off on How to create an effective software security training program for agile teams