Application Security , DevSecOps , Next-Generation Technologies & Secure Development

Shifting Left for DevSecOps Success

Filip Verloy of Noname Security on Integrating API Security Testing in Development
Filip Verloy, technical evangelist, EMEA, Noname Security

According to a recent survey conducted by Noname Security, 41% of organizations experienced an API security incident in the last 12 months and 63% of the incidents involved a data breach or data loss. Filip Verloy, technical evangelist, EMEA at Noname Security, says that "tighter integration of API security testing during the development life cycle" could have prevented the majority of the incidents.

In a video interview with Information Security Media Group, Verloy discusses:

  • The challenge of delivering new apps quickly in the drive to "shift left";
  • How the rise of super apps further complicates the challenge of introducing security;
  • How to hook security onto the development process and not have it be perceived as a hindrance.

Verloy engages and advises customers, partners and the security industry at large, sharing his experience, insights and strategies on API security. Prior to joining Noname Security, he was the field CTO for EMEA at zero trust data management startup Rubrik, and he has also served at Citrix, Dell, Riverbed and VMware in roles ranging from architect to solutions executive. He has been in the IT industry for over 20 years, spanning the customer, consulting and vendor sides.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.