{"id":9161,"date":"2013-10-06T17:00:00","date_gmt":"2013-10-06T17:00:00","guid":{"rendered":"https:\/\/cloudcomputing.sys-con.com\/node\/2818736"},"modified":"2013-10-06T17:00:00","modified_gmt":"2013-10-06T17:00:00","slug":"cloud-expo-cloud-shifts-the-burden-of-security-to-development-2","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/cloud-expo-cloud-shifts-the-burden-of-security-to-development-2\/","title":{"rendered":"Cloud Expo: Cloud Shifts the Burden of Security to Development"},"content":{"rendered":"<p>The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. Developers are extremely well-poised to perform tasks critical for securing the application \u2013 provided that certain key obstacles are overcome.<br \/>\nIn his session at the 13th International Cloud Expo\u00ae, Wayne Ariola, Chief Strategy Officer at Parasoft, will explore three ways to help development bear the burden of security that the cloud places on them:<br \/>\nUse penetration testing results to help developers determine how to effectively \u201charden\u201d the most vulnerable parts of the application.<br \/>\nApply the emerging practice of \u201cservice virtualization\u201d to provide developers the test environment access needed to exercise realistic security scenarios from the development environment.<br \/>\nImplement policy-driven development to help developers understand and satisfy management\u2019s security expectations. <\/p>\n<p><a href=\"https:\/\/cloudcomputing.sys-con.com\/node\/2818736\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. Developers are extremely well-poised to perform tasks critical for securing the application &ndash; provided that certain key obstacles are overcome.<br \/>\nIn his session at the 13th International Cloud Expo&reg;, Wayne Ariola, Chief Strategy Officer at Parasoft, will explore three ways to help development bear the burden of security that the cloud places on them:<br \/>\nUse penetration testing results to help developers determine how to effectively &ldquo;harden&rdquo; the most vulnerable parts of the application.<br \/>\nApply the emerging practice of &ldquo;service virtualization&rdquo; to provide developers the test environment access needed to exercise realistic security scenarios from the development environment.<br \/>\nImplement policy-driven development to help developers understand and satisfy management&rsquo;s security expectations. <\/p>\n<p><a href=\"https:\/\/cloudcomputing.sys-con.com\/node\/2818736\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-9161","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/9161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=9161"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/9161\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=9161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=9161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=9161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}