CDM-CYBER-DEFENSE-eMAGAZINE-March-2019
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Overcoming Software Security Issues Caused by the<br />
Third-Party Software Procurement Model<br />
As software becomes more sophisticated, organizations of all sizes continue to harness its<br />
capabilities to transform their go-to-market strategies and streamline their operations. Whether<br />
the software is developed in-house, through third-party vendors or is of the pre-packaged, off-theshelf<br />
variety; businesses are looking to exploit the latest innovations in order to more effectively<br />
compete in the marketplace.<br />
With the rise in the value of intangible software-based services and the data collected through<br />
those services, companies have invested heavily in security software and systems in order to<br />
protect their most important assets. At the same time, DevOps have been given the mandate to<br />
implement more and more innovative functionality, as quickly as possible.<br />
This has put the security and DevOps teams at cross-purposes. Getting software provisioned as<br />
quickly as possible has not given the security team’s adequate time to ensure full product security.<br />
Until recently, ensuring software security has not had the same priority.<br />
That is changing. With new data security and privacy regulations being enacted in some states<br />
and the E.U., the C-Suite is pushing hard to have its cake and eat it too. In other words, CEOs,<br />
CIOs and CSOs are mandating that software be more capable, developed and provisioned more<br />
quickly, while being more hardened against attack.<br />
The current third-party software procurement model makes the previously mentioned C-Suite<br />
goals unattainable.