Software Integrity Blog

Author Archive

David Harvey

dharvey

David Harvey, CISSP, is a former principal consultant with Synopsys. David evaluated agile practices, led code reviews, and trained developers on defensive coding and threat modeling. Before joining Synopsys, he worked for UnitedHealth Group, where he co-founded and led a developer-facing software security initiative. David has also worked as an architect and developer at Siemens, Boeing, and Unisys. He learned about software security when the “information superhighway” was just becoming a thing and Fortune 20 companies were starting to bear the brunt of unsanitary design and coding practices that had been de rigueur in the old, segregated, safe “client-server” or “feudal” deployment models.


Posts by David Harvey:

 

Is threat modeling compatible with Agile and DevSecOps?

Bryan Sullivan, a Security Program Manager at Microsoft, called threat modeling a “cornerstone of the SDL” during a Black Hat Conference presentation. He calls it a ‘cornerstone’ because a properly executed threat model:

Continue Reading...

Posted in Agile, CI/CD & DevOps | Comments Off on Is threat modeling compatible with Agile and DevSecOps?

 

How to overcome common software security training hurdles

Software security training is an important part of software development. In the latest Ponemon study on data breaches, training and awareness programs are the number one control implemented after a data breach. However, as with any security control, it’s possible to incorrectly implement training. Within this post, I’ll discuss several common software security training hurdles that organizations often experience, and explore how to prevent and/or overcome these problems.

Continue Reading...

Posted in Data Breach Security, Security Training & Awareness | Comments Off on How to overcome common software security training hurdles

 

The IRS data breach: How not to do identity proofing

We discuss the shortcomings of the IRS’s Get Transcript service, especially identity proofing, and how these widespread attacks could have been prevented.

Continue Reading...

Posted in Data Breach Security, Software Architecture & Design | Comments Off on The IRS data breach: How not to do identity proofing

 

How to create an effective software security training program for agile teams

Agile is a great innovation in software development. The agile focus on stakeholder involvement end-to-end, transparency and short delivery cycles are changes for the better for our industry. However, just-in-time nature of requirements, bug and flaw triage in agile makes it all the more critical that everyone on the team has a certain level of security knowledge.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Security Training & Awareness, Software Architecture & Design, Static Analysis (SAST) | Comments Off on How to create an effective software security training program for agile teams