CYBER 101

  • Alerts
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Documents
  • Domains
  • Entertainment
  • FAQ
  • Incidents
  • Quotes
  • Tools
  • Tutorials

Join our newsletter

FOLLOW US

Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial
No Result
View All Result

”Not treating security vulnerabilities…”

Kenneth Silsbee

1 min read
in Quotes

”Not treating security vulnerabilities as defects is actually avoiding the realities of software development and Information security’s still-developing role. The purpose of development is to make software that satisfies customer needs, and fixing bugs is part of it.” Kenneth Silsbee – Director of Security and Compliance at Learn on Demand Systems

Source: Teach Beacon

About Kenneth Silsbee

Balancing Information assurance/security with technology and business. Design, implement, and manage information security programs and risk management efforts. From leading audit remediation efforts, to building software assurance programs, to managing security initiatives.
Information Security is more than just relying on appliances to safeguard customer data, protect intellectual property, and keep an infrastructure from being hacked.
Combine the right balance of risk management, security policies and practices, and evaluation methods to create a cohesive security framework. With experience in telecommunications, aerospace, software development, insurance, and professional services consulting.

Related

Tags: CybersecurityKenneth SilsbeeQuotequotesSecurity QASecurity QA Quotes
5
VIEWS
ADVERTISEMENT

Related Posts

“App stores are filled with applications that…”

“App stores are filled with applications that…”

July 22, 2022
“Cybersecurity threats are evolving as…”

“Cybersecurity threats are evolving as…”

July 18, 2022
“Cybersecurity threats are evolving as…”

“Cybersecurity threats are evolving as I speak…”

July 18, 2022
“Startups are incredibly vulnerable to…”

“Startups are incredibly vulnerable to…”

July 18, 2022

More Articles

The GDPR Series- Podcast

March 24, 2022
Incidents

Threat actor claims to have hacked European manufacturer of missiles MBDA

August 1, 2022
Alerts

AVEVA security advisory (AV22-125)

March 8, 2022
Incidents

Iran Spear-Phishers Hijack Email Conversations in New Campaign

June 15, 2022

Human-Centered Security (episode 12)

June 23, 2022

Reverse Engineering Ransomware

March 22, 2021

Accountable party

November 14, 2020
APIs

In 2019 it was detected an average of 11 threats per Mac endpoint—nearly double the average of 5.8 threats per endpoint on Windows.

October 9, 2020
Load More

World’s number one cybersecurity repository. Find everything you need about cybersecurity.

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Attackers
    • Incidents
    • Threats
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Quotes

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.