Since 2001, the Denim Group have been helping their clients create resilient software that can be deployed to withstand attacks. They do this across the portfolio of software that clients have, and also do it at scale across the enterprise.I wanted to learn more about how their software development background helps them bridge the gap […]
The politicization of enhancing election security hinders the effort, says John Dickson, principal at cyber firm Denim Group who has consulted with election officials in Texas. “We’ve fully transitioned out of the world of technical and objective to an entirely political realm, and I mean that in a negative way,” Dickson explains. “Now you’ve got […]
John Dickson, principal at local cybersecurity firm The Denim Group, said federal lawmakers are notoriously ignorant on tech issues, but Hurd was one of the few exceptions. “Will was highly regarded for his technical grasp because he came from the [cybersecurity] industry,” Dickson said. “He also had the intelligence part, which is inextricably linked – […]
Denim Group, the leading independent application security firm, announced an integration with Snyk, the leader in developer-first open source security. This integration allows customers to find and fix open source code vulnerabilities within the ThreadFix platform, empowering developers to better manage software security vulnerabilities through the platform’s comprehensive view of open source and proprietary code.
“I view this as one more indicator of continued nation-state interest in the U.S. 2020 election and further need for a reset of the dialogue on this issue,” said John Dickson, principal at Denim Group, a cybersecurity company. “There is broad consensus that the Russians were heavily involved in manipulating the 2016 election. Given the […]
“At the end of the day, I would hate to put that on developers—not in the same way that I would put the responsibility for security on developers,” said Denim Group’s Cornell. Yet, he added, the role of developer is changing. “Over the last 15 years that I’ve been in the application-security space, we have […]