01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Overcoming Software Security Issues Caused by the<br />

Third-Party Software Procurement Model<br />

As software becomes more sophisticated, organizations of all sizes continue to harness its<br />

capabilities to transform their go-to-market strategies and streamline their operations. Whether<br />

the software is developed in-house, through third-party vendors or is of the pre-packaged, off-theshelf<br />

variety; businesses are looking to exploit the latest innovations in order to more effectively<br />

compete in the marketplace.<br />

With the rise in the value of intangible software-based services and the data collected through<br />

those services, companies have invested heavily in security software and systems in order to<br />

protect their most important assets. At the same time, DevOps have been given the mandate to<br />

implement more and more innovative functionality, as quickly as possible.<br />

This has put the security and DevOps teams at cross-purposes. Getting software provisioned as<br />

quickly as possible has not given the security team’s adequate time to ensure full product security.<br />

Until recently, ensuring software security has not had the same priority.<br />

That is changing. With new data security and privacy regulations being enacted in some states<br />

and the E.U., the C-Suite is pushing hard to have its cake and eat it too. In other words, CEOs,<br />

CIOs and CSOs are mandating that software be more capable, developed and provisioned more<br />

quickly, while being more hardened against attack.<br />

The current third-party software procurement model makes the previously mentioned C-Suite<br />

goals unattainable.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!