The Book
Membership
Explore Membership
Global Expansion Program
Media Assets
AppSecCon
S3M2
Journey to AppSec Maturity
Coming Soon
Free Resources
Blogs
Digital Purple Book
Private Social Network
Panel Discussions
Media Assets
Events
Upcoming Events
JTAM Virtual Workshop Sept 2023
Past Events
Chicago Meetup
JTAM Luncheon
AppSecCon New York Reception
AppSecCon Austin Reception
AppSecCon Santa Clara Reception
Mumbai Chapter
Atlanta Chapter
Bengaluru Chapter
New Delhi Chapter
NYC Chapter Launch
Cyber Soiree
Women In Security
Davos Dialogue
First Look
SBOM
Resources
Podcasts
Blogs
State of AppSec 2023
Contact Us
Blog
The Book
Co-authors
Blog
Partners
Membership
Explore Membership
Global Expansion Program
AppSecCon
S3M2
Journey to AppSec Maturity
Coming Soon
Free Resources
Blogs
Digital Purple Book
Private Social Network
Panel Discussions
Media Assets
Events
Upcoming Events
Past Events
AppSecCon New York Reception
AppSecCon Austin Reception
AppSecCon Santa Clara Reception
Mumbai Chapter
Atlanta Chapter
Bengaluru Chapter
New Delhi Chapter
NYC Chapter Launch
Cyber Soiree
AppSecCon
Women In Security
Davos Dialogue
First Look
SBOM
Events
Upcoming Events
JTAM Virtual Workshop - September
Past Events
JTAM Luncheon
Chicago Meetup
AppSecCon New York Reception
AppSecCon Austin Reception
AppSecCon Santa Clara Reception
Mumbai Chapter
Atlanta Chapter
Bengaluru Chapter
New Delhi Chapter
NYC Chapter Launch
Cyber Soiree
AppSecCon
Women In Security
Davos Dialogue
First Look
SBOM
Resources
Podcast
Blogs
State of AppSec 2023
Resources
Podcast
Blogs
State of AppSec 2023
Join Now
Solutions
Integrations
Community
Resources
Company
Request Demo
Join Now
Welcome to
The Purple Blog
Featured Topics
Protecting Data
Risk Management
C-Suite View
Software Security
Cloud Security
DevSecOps
Zero Trust
What is The Purple Book Community's Scalable Software Security Maturity Model (S3M2)?
By
Purple Book Community
and
Jun 29, 2023
Why Maturity Models are Needed in the First Place
By
Aruneesh Salhotra
and
Brook Schoenfield
May 10, 2023
How to Address Security Threats in M&A
By
Arvin Bansal
and
Apr 14, 2023
Breaking Organizational Silos
By
Aruneesh Salhotra
and
Mar 24, 2023
A Non-Tech Founder’s Guide to CyberSecurity
By
Mark Lambert
and
Mar 9, 2023
Why Your Security Strategy Must Evolve Alongside the Threat Landscape
By
Leo Cunningham
and
Mar 1, 2023
Factorial Separation of Duties for Modern AppSec Compliance
By
Aaron Smith
and
Feb 21, 2023
Four Cybersecurity Trends in 2023 from a Digital Transformation Perspective
By
Maria Schwenger
and
Feb 8, 2023
What parallels can we draw from the NFL to take a risk-based approach for AppSec?
By
Aruneesh Salhotra
and
Feb 1, 2023
Avoiding Common Vulnerability Management Errors CISOs Still Make
By
LingRaj Patil
and
Jan 27, 2023
Security Champions: Why Do We Need Them and What Role Do They Play?
By
Eric Yancy
and
Chitra Dharmarajan
Jan 13, 2023
How Establishing Guardrails Can Improve AppSec Posture (and Your Holidays)
By
Nikhil Gupta
and
Dec 20, 2022
The Conundrum of Security Remediation
By
Mohit Kalra
and
Dec 13, 2022
How to Improve Collaboration Between Developers and Security Professionals
By
Jim Rutt
and
Dec 9, 2022
Best Practices to Cyber Proof your Business for the Holidays
By
Deepak Parashar
and
Nov 29, 2022
Embracing New Business Frontiers with Zero Trust Security
By
Deepak Mathur
and
Nov 23, 2022
The Best Education Resource in Cybersecurity
By
Valmiki Mukherjee
and
Oct 25, 2022
How AI & ML Transform DevSecOps — Exploring Their Full Potential
By
Maria Schwenger
and
Oct 11, 2022
Security Metrics That Make a Difference
By
Tanya Janca
and
Sep 20, 2022
Beefing Up the Software Supply Chain for Security
By
Cassie Crossley
and
Sep 6, 2022
AppSec Programs: Tips on How to Implement Them and Convince Leadership
By
Maria Schwenger
and
Aug 23, 2022
How to Improve Your AppSec With Security Champions
By
Nitin Raina
and
Aug 9, 2022
Top Practices to Help You Transition to AppSec
By
Sangram Dash
and
Jul 26, 2022
An Introduction to AppSec and Why It’s Important to You
By
Jennifer McLarnon
and
Jul 12, 2022
SDLC Security Controls
By
Waldemar Pabon
and
Jun 21, 2022
Bringing Security to the IoT
By
Mark Merkow
and
Jun 7, 2022
DevSecOps: Four Pillars for Success
By
Nikhil Gupta
and
May 16, 2022
Why Cybersecurity is Crucial for M&As
By
Luis Guzmán
and
May 10, 2022
It’s All in the Numbers: Decoding AppSec
By
Mark Lambert
and
May 3, 2022
AppSecOps: An Astute Business Approach to Security
By
Munish Gupta
and
Apr 26, 2022
4 GRC Mistakes That Can Derail Your Risk Management Plan
By
Piyoush Sharma
and
Apr 19, 2022
Join us at AppSecCon 2022 - A Premier AppSec Conference
By
Chari Monge
and
Apr 12, 2022
How to Convince Leadership to Prioritize Security for Your Business
By
Kunal Bhattacharya
and
Apr 7, 2022
AppSec: Moving the Collective Needle on Security is the Need of the Hour
By
Brook S.E. Schoenfield
and
Mar 22, 2022
Why Diversity Is Needed in Security
By
Chari Monge
and
Mar 8, 2022
5 Ways to Make 2022 More Secure
By
Andrew Gorecki
and
Feb 22, 2022
Practice Makes Business Better
By
Cormac Brady
and
Feb 8, 2022
Why Your Business Needs to Evolve to DevSecOps Right Now
By
Prabhath Karanth
and
Jan 31, 2022
Want to Triple Your Supply Chain Security?
By
Cassie Crossley
and
Jan 30, 2022
A Movement to Foster Continuous Security
By
Upendra Mardikar
and
Jan 29, 2022
Follow us
Get Updates!
First Name
Last Name
Email Address
By submitting this form you agree to our
terms of use
and acknowledge our
privacy statement
.
Thank you for Subscribing!
Oops! Something went wrong while submitting the form.