Aug. 24, 2022, 3:04 p.m. | Michael Griffin

Security Boulevard securityboulevard.com




Companies are made up of what they build, borrow, and buy. On the software development front, Sonatype’s tools help with two major issues: what you build (software) and borrow (open source code). But what about the things you buy? It's part of a wide umbrella in organizations known as “procurement,” an area with an all-too-common lack of understanding and oversight.


The post Setting Boundaries: How Procurement Relates to Security (Part 1) appeared first on Security Boulevard.

devsecops industry commentary news and views post security procurement sbn news security

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Audit and Compliance Technical Analyst

@ Accenture Federal Services | Washington, DC

ICS Cyber Threat Intelligence Analyst

@ STEMBoard | Arlington, Virginia, United States

Cyber Operations Analyst

@ Peraton | Arlington, VA, United States

Cybersecurity – Information System Security Officer (ISSO)

@ Boeing | USA - Annapolis Junction, MD

Network Security Engineer I - Weekday Afternoons

@ Deepwatch | Remote