Continuum Security at the Digital Enterprise Show 2017
Our team will be at the Digital Enterprise Show in Madrid from the 22 – 25 May in sunny Madrid: www.des-madrid.com We also have a limited number of free passes for anyone interested! Just send us an email through the contact-us form and we’ll send you the details. This pass includes: https://www.des-
Our CEO, Stephen de Vries, will be giving a talk on Wednesday the 23rd at 3pm called “The Software Security Challenge” where he’ll discuss the challenges facing organisations to address the need for robust and secure software in the age of DevOps and Agile practices. Digital transformation is built on software – and increasingly enterprises rely on their own software to fuel and deliver innovation. The security of this software is therefore a key requirement in keeping the business running. We’ll provide practical advice on how to build security into software from the start.
See you in Madrid!
Did you like this article?
- Adam Shostack joins Continuum Security’s board14 May 2018We at Continuum Security are absolutely delighted to announce that Adam Shostack has joined our Advisory Board. Adam brings with him considerable experience and wealth of knowledge that dovetails perfectly with Continuum Security’s mission to bring security into the software design & development process through threat modeling. Whilst at Microsoft, Adam was the lead designer […]READ MORE
- Building GDPR compliant software with IriusRisk27 March 2018The EU General Data Protection Regulation (GDPR) comes into effect on the 4th May 2018 and has wide ranging implications for any company anywhere that processes the personal data of EU citizens. A lot has been written about how GDPR applies at the organisation level, and what general controls should be in place to comply with […]READ MORE
- Schedule a meeting with us at RSA to discuss #EasyThreatModeling21 March 2018The Continuum Security team will be at RSA in San Francisco to answer all your threat modeling and DevSecOps questions. Threat Modeling is often seen as a complex activity that can only be performed by skilled security analysts who have to invest significant time and energy into producing a useful threat model and its corresponding […]READ MORE