In Chapter 10 of 16 in his 2011 Capture Your Flag interview, cloud computing technology executive Marc Ferrentino answers “So How Has Your Approach to Solving Problems You are Having Led You to Developing Social Tools for the Enterprise?” Ferrentino, who concepted a corporate social network called Chatter, walks through the process that informed why and how Salesforce Chatter was built. He compares and contrasts corporate social networks with consumer social networks and what he learned about applying Web 2.0 and social tools in an enterprise environment. Ferrentino is Chief Technology Officer (CTO) of cloud computing at BMC Software. Previously, he was Chief Technology Architect (CTA) at Salesforce.com. Previous to Salesforce.com, Ferrentino worked in mobile and Internet startups and at Goldman Sachs. He earned a BSEE in electrical engineering from the University of Michigan. View more career videos at www.captureyourflag.com Follow us on Twitter www.twitter.com Like us on Facebook: www.facebook.com
Posts Tagged ‘ approach ’
Art of Software Security Testing: Chris Wysopal
Chris Wysopal, CTO Veracode, Inc discusses valuable insights from his latest book, Art of Software Security Testing, The: Identifying Software Security Flaws.www.informit.com Get all the OnSecurity Vidcasts FREE:www.informit.com Subscribe Now: www.informit.com The Art of Software Security Testing delivers in-depth, up-to-date, battle-tested techniques for anticipating and identifying software security problems before the “bad guys” do. Drawing on decades of experience in application and penetration testing, this book’s authors can help you transform your approach from mere “verification” to proactive “attack.” The authors begin by systematically reviewing the design and coding vulnerabilities that can arise in software, and offering realistic guidance in avoiding them. Next, they show you ways to customize software debugging tools to test the unique aspects of any program and then analyze the results to identify exploitable vulnerabilities. This book is indispensable for every technical professional responsible for software security: testers, QA specialists, security professionals, developers, and more. For IT managers and leaders, it offers a proven blueprint for implementing effective security testing or strengthening existing processes. www.informIT.com/podcasts