Episode 5 - Breaches Beware: Richard Hyatt on Putting Security First in Your Software

Episode Thumbnail
00:00
00:00
This is a podcast episode titled, Episode 5 - Breaches Beware: Richard Hyatt on Putting Security First in Your Software. The summary for this episode is: <p>Target, Jeep, Ashley Madison. You don't have to look very far to find examples of major <a href= "https://georgianpartners.com/category/podcast/security/" target= "_blank" rel="noopener">security breaches</a> happening at businesses all around us. And it's not just the big guys that are at risk either. Companies large and small are finding themselves under attack. In this episode of the <a title= "Georgian Impact Podcast" href= "https://georgianpartners.com/podcast/" target="_blank" rel= "noopener">Georgian Impact Podcast</a>, Jon Prial talks with veteran entrepreneur and CTO Richard Hyatt about why it's so important to put security first in your business, and why keeping your environments separate is such a critical part of that process.</p> <p><strong>You'll hear about:</strong></p> <ul> <li>Why keeping development and production environments separate is essential (1:15)</li> <li>The role of developers in security (5:09)</li> <li>Working with third-party vendors for security (7:54)</li> <li>Key security trends that businesses should be focusing on (9:25)</li> </ul>

DESCRIPTION

Target, Jeep, Ashley Madison. You don't have to look very far to find examples of major security breaches happening at businesses all around us. And it's not just the big guys that are at risk either. Companies large and small are finding themselves under attack. In this episode of the Georgian Impact Podcast, Jon Prial talks with veteran entrepreneur and CTO Richard Hyatt about why it's so important to put security first in your business, and why keeping your environments separate is such a critical part of that process.

You'll hear about:

  • Why keeping development and production environments separate is essential (1:15)
  • The role of developers in security (5:09)
  • Working with third-party vendors for security (7:54)
  • Key security trends that businesses should be focusing on (9:25)