Troy Vinson: Learning From the Rackspace Security Breach with Troy Vinson - Episode 225
In this podcast episode, Troy Vinson, a Principal Software Architect at Clear Measure, shares valuable insights about the Rackspace security breach for listeners to learn from. He brings his years of experience in Information Systems Security and Software Development technologies to the table to discuss the importance of security in programming, contingency plans, email protection, and custom application security measures.
The conversation covers various topics, including a discussion on what a Certified Ethical Hacker is and how the focus divides between security and programming. Listeners will also gain an understanding of the Rackspace security breach and its impact. Troy emphasizes the importance of having a contingency plan and emphasizes the need for a recovery plan.
Additionally, he provides tips on how software development teams can become more security-conscious, including having a software bill of materials to define which software can be used. Further, Troy highlights the significance of email protection as one of the basic ways of ensuring security measures are in place.
Overall, this podcast offers valuable insights for anyone wanting to understand the importance of security measures in the world of programming and software development.
The post Troy Vinson: Learning From the Rackspace Security Breach with Troy Vinson - Episode 225 first appeared on Azure DevOps Show.
Published on:
Learn moreThe Azure DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
Related posts
Microsoft Fabric Data Security | Extend Your Protection
Guarding against potential security breaches is of utmost importance in today's increasingly connected world. In this video, you'll learn how ...
Insights from GitHub's Chief Security Officer
In this episode of Afternoon Cyber Tea, Ann Johnson sits down with Mike Hanley, the Chief Security Officer and Senior Vice President of Engine...
Microsoft Purview compliance portal: Information Protection – Exchange Auto-labeling supports non-mail enabled security groups
The Microsoft Purview compliance portal now offers an added layer of flexibility and customization through its exchange auto-labeling feature....
Microsoft Purview compliance portal: Information Protection – Exchange Auto-labeling supports non-mail enable security groups
Microsoft Purview compliance portal has introduced new features to Information Protection by allowing Exchange Auto-labeling to non-mail enabl...
Bojan Magusic: Azure Security - Episode 240
In this episode, Bojan Magusic, a Product Manager on the Customer Acceleration Team, talks about his passion for cybersecurity and his book 'A...
Episode 69: Secured Supply Chain and Software Bill of Materials (SBOM)
In this episode of the podcast, the hosts delve into the topic of securing the software supply chain through Software Bill of Materials (SBOM)...
Custom security attributes in Azure AD part 2: what are custom security attributes
Are you looking into extending your Azure AD schema with custom attributes to enhance security? Look no further than this informative post. In...
Turning to the Purple Side
In this episode of Security Unlocked, Tanya Janca, the founder of We Hack Purple, joins hosts Natalia Godyla and Nic Fillingham to discuss the...
Securing Modern Software
In this episode of Security Unlocked, Natalia Godyla and Nic Fillingham have a discussion with Chris Wysopal, co-founder, and CTO at Veracode,...