<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Secure Delivery</title><link>https://securedelivery.io/practitioners/toby-irvine/</link><description>Recent content on Secure Delivery</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Mon, 04 Jan 2021 21:53:43 +0000</lastBuildDate><atom:link href="https://securedelivery.io/practitioners/toby-irvine/index.xml" rel="self" type="application/rss+xml"/><item><title>OWASP Cornucopia Online And Mobile</title><link>https://securedelivery.io/articles/play-owasp-cornucopia-mobile-online/</link><pubDate>Tue, 11 Jun 2024 14:13:11 +0100</pubDate><guid>https://securedelivery.io/articles/play-owasp-cornucopia-mobile-online/</guid><description>This week, the OWASP Cornucopia project announced some significant updates, and I&amp;rsquo;m proud to have contributed one. I like to tell a story, though, so first a bit of history.
At Secure Delivery, we’ve always used the card games Cornucopia and Elevation of Privilege and love the agile approach to threat modelling that puts development teams at the heart of uncovering security issues in their systems. Three years ago, in May 2021, a global pandemic was making it pretty damn hard to sit in a room together and play cards.</description></item><item><title>The Lost Art of Keeping a Secret</title><link>https://securedelivery.io/articles/the-lost-art-of-keeping-a-secret/</link><pubDate>Mon, 18 Apr 2022 14:38:14 +0000</pubDate><guid>https://securedelivery.io/articles/the-lost-art-of-keeping-a-secret/</guid><description>When we&amp;rsquo;re working with product development teams, one of our foundational principles is that product security isn&amp;rsquo;t just a quality of what&amp;rsquo;s being delivered, it&amp;rsquo;s in the quality of your ways of working, too. There are many ways that how you&amp;rsquo;re delivering products can cause security issues. One of these ways is how you&amp;rsquo;re handling the secrets that are part of your product development (credentials, API keys, private certificates, etc.). A screw-up here can very quickly cause a Very Bad Day™, so what should we be doing to keep our secrets, well, secret?</description></item><item><title>What is DevSecOps? (And DevOps)</title><link>https://securedelivery.io/articles/what-is-devsecops/</link><pubDate>Thu, 31 Mar 2022 12:58:14 +0000</pubDate><guid>https://securedelivery.io/articles/what-is-devsecops/</guid><description>Is it too on the nose to use an image of a waterfall for this article? Sure, it&amp;rsquo;s the classic example of a one-way process but it&amp;rsquo;s also continuous delivery of water. Keep reading for more incredible insights!
In the Beginning Some of us have been around for a very long time. We remember dial-up internet, BBSs and Webrings and we&amp;rsquo;ll bore you senseless with repeated stories of how nothing&amp;rsquo;s changed in tech, really, but somehow and at the same time everything&amp;rsquo;s changed and completely for the worse.</description></item><item><title>Securing the Digital Factory: Part 1</title><link>https://securedelivery.io/articles/securing-the-digital-factory-part-1/</link><pubDate>Tue, 22 Mar 2022 11:30:08 +0100</pubDate><guid>https://securedelivery.io/articles/securing-the-digital-factory-part-1/</guid><description>I&amp;rsquo;m not sure what&amp;rsquo;s the best hero image for an article talking about &amp;ldquo;digital factories&amp;rdquo;, maybe it&amp;rsquo;s a &amp;ldquo;Minority Report but in a hardhat&amp;rdquo; kind of vibe? Let&amp;rsquo;s go with that. To business!
If you know me you know I&amp;rsquo;m not a big fan of analogies. They&amp;rsquo;re generally used to poorly convey a reasonably complex topic in an overly-simplistic way, by people who have a poor understanding of the subject matter to start with.</description></item><item><title>Chesterton's Fence, and Monkeys</title><link>https://securedelivery.io/articles/chestertons-fence-and-monkeys/</link><pubDate>Mon, 12 Apr 2021 08:14:42 +0100</pubDate><guid>https://securedelivery.io/articles/chestertons-fence-and-monkeys/</guid><description>Chesterton&amp;rsquo;s Fence, and Monkeys G. K. Chesterton—writer; modernist philosopher; friend to George Bernard Shaw, H. G. Wells and Bertrand Russell but, most importantly, author of a piece I can torture into an article on security.
Chesterton&amp;rsquo;s fence In the matter of reforming things, as distinct from deforming them, there is one plain and simple principle; a principle which will probably be called a paradox. There exists in such a case a certain institution or law; let us say, for the sake of simplicity, a fence or gate erected across a road.</description></item><item><title>Scaling Product Security Across the Org</title><link>https://securedelivery.io/articles/how-to-scale-product-security/</link><pubDate>Mon, 15 Mar 2021 13:29:08 +0100</pubDate><guid>https://securedelivery.io/articles/how-to-scale-product-security/</guid><description>The Ratio In our work with large organisations we&amp;rsquo;ve developed a &amp;ldquo;rule of thumb&amp;rdquo; that quite usefully predicts the proportion of development and cybersecurity staff in the workforce. For companies whose primary business isn&amp;rsquo;t software development but have internal, established application delivery capability (banks, telcos, etc.) around 10% of the workforce are software developers.
At the scale these organisations operate at, typically an architecture function has split off from engineering and is around 10% of the developer total.</description></item><item><title>What is The Cloud? (it's Zero Trust)</title><link>https://securedelivery.io/articles/what-is-the-cloud-its-zero-trust/</link><pubDate>Mon, 20 Jul 2020 11:37:42 +0100</pubDate><guid>https://securedelivery.io/articles/what-is-the-cloud-its-zero-trust/</guid><description>Is this guy really going to do a “What is the cloud?” article in 2020? Yes, he is. I mean, I am. Because I want to talk about the cloud. No, not cloud computing. No, not a series of tubes. Not &amp;ldquo;just someone else&amp;rsquo;s computer&amp;rdquo;. This cloud:
This actual cloud. We’ve all seen it thousands of times, and you&amp;rsquo;ve probably used it a lot if you’re reading this article. You might have seen it in use like:</description></item><item><title>The Chaos Butterfly of Security Standards</title><link>https://securedelivery.io/articles/the-chaos-butterfly-of-security-standards/</link><pubDate>Tue, 14 Jul 2020 09:32:42 +0100</pubDate><guid>https://securedelivery.io/articles/the-chaos-butterfly-of-security-standards/</guid><description>The mathematician and meteorologist, Edward Lorenz, made the Butterfly Effect famous with his talk in 1972, &amp;ldquo;Does the Flap of a Butterfly&amp;rsquo;s Wings in Brazil Set Off a Tornado in Texas?&amp;rdquo; and it&amp;rsquo;s stuck in the popular conscious ever since. The notion that small events in a chaotic system can build to large changes over time and space.
In large companies I frequently see a hope that a similar mechanism will occur when a security standard is published to the company SharePoint.</description></item><item><title>The Biggest Misconception in Application Security</title><link>https://securedelivery.io/articles/biggest-misconception-in-appsec/</link><pubDate>Wed, 01 Jul 2020 09:41:00 +0100</pubDate><guid>https://securedelivery.io/articles/biggest-misconception-in-appsec/</guid><description>I&amp;rsquo;ve touched on this in previous articles, but it&amp;rsquo;s worth dedicating a little time to this misconception as it&amp;rsquo;s at the root of so many of the problems that organisations have with security and delivery. A common way to think about maintaining security while delivering software systems at pace is this.
Where rapid delivery of changes into production is one end of a scale, being secure is at the other end and, as an organisation, you pick where along the scale you&amp;rsquo;re comfortable according to your risk appetite.</description></item><item><title>Building a Culture of Quality, Not Just Security</title><link>https://securedelivery.io/articles/building-a-culture-of-quality-not-just-security/</link><pubDate>Mon, 29 Jun 2020 08:30:08 +0100</pubDate><guid>https://securedelivery.io/articles/building-a-culture-of-quality-not-just-security/</guid><description>In my previous article I covered how security is just one aspect of the quality of the applications you&amp;rsquo;re building. Today I&amp;rsquo;d like to focus on the process of building high quality systems and, in a startling break with tradition, actually define what culture is so that we can talk meaningfully about culture change.
Let&amp;rsquo;s remind ourselves of the standard for software quality from ISO 25010:
It never makes sense to talk about &amp;ldquo;building a culture of security&amp;rdquo;.</description></item><item><title>Number of Data Breaches is not a Good Security Metric</title><link>https://securedelivery.io/articles/number-of-data-breaches-is-not-a-good-security-metric/</link><pubDate>Thu, 18 Jun 2020 11:30:08 +0100</pubDate><guid>https://securedelivery.io/articles/number-of-data-breaches-is-not-a-good-security-metric/</guid><description>Ok, of course it&amp;rsquo;s not. Does this feel familiar though?
Budget gets allocated to cybersecurity Cybersecurity activities happen Everyone is reasonably happy, except the application delivery teams having cybersecurity activities done to them Terrible news - a data breach! PANIC Budget gets substantially increased for cybersecurity Substantially more cybersecurity activities happen Everyone is reasonably happy, except the application delivery teams having substantially more cybersecurity activities done to them Terrible news - a data breach!</description></item></channel></rss>