Inside IT: Developing Applications With Security Built-In

August 19th, 2014 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
The audio player code can be used without the image as follows:


 
This audio file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the audio file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Inside IT - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: Episode 82 – The use of mobile devices in the enterprise – and everywhere for that matter – has increased dramatically over the past several years. This is as true at Intel as anywhere. As the use of mobile devices increased at the company, so did the number of mobile applications written internally. Many apps were one-off and ad-hoc. While a lot of needs were being met with these apps, the lack of process created some issues. In this podcast, we’ll hear from Steve Willoughby, Senior Information Security Specialist at Intel. Willoughby talks about how Intel created its Five Star Application Development program, how security is a key part of this approach, and how Intel’s Secure Development Lifecycle tool bakes security into every stage of application development.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , , , ,
 
Posted in: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel
 


 


Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.