all InfoSec news
Setting Boundaries: How Procurement Relates to Security (Part 1)
Aug. 24, 2022, 3:04 p.m. | mgriffin@sonatype.com (Michael Griffin)
Sonatype Blog blog.sonatype.com
Companies are made up of what they build, borrow, and buy. On the software development front, Sonatype’s tools help with two major issues: what you build (software) and borrow (open source code). But what about the things you buy? It's part of a wide umbrella in organizations known as “procurement,” an area with an all-too-common lack of understanding and oversight.
devsecops industry commentary news and views post security procurement security
More from blog.sonatype.com / Sonatype Blog
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Cyber Security Architect - SR
@ ERCOT | Taylor, TX
SOC Analyst
@ Wix | Tel Aviv, Israel
Associate Director, SIEM & Detection Engineering(remote)
@ Humana | Remote US
Senior DevSecOps Architect
@ Computacenter | Birmingham, GB, B37 7YS