{"id":10464,"date":"2023-11-30T11:44:30","date_gmt":"2023-11-30T10:44:30","guid":{"rendered":"https:\/\/trustvalley.swiss\/?p=10464"},"modified":"2023-11-30T11:44:30","modified_gmt":"2023-11-30T10:44:30","slug":"the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security","status":"publish","type":"post","link":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/","title":{"rendered":"The Developer: the Weakest and Overlooked Link in Enterprise Data Security"},"content":{"rendered":"<div class=\"blog-article\">\n<h1><b>The Developer: the Weakest and Overlooked Link in Enterprise Data Security<\/b><\/h1>\n<\/div>\n<h3>Guest post by<strong>\u00a0<span style=\"text-decoration: underline;\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/balmelli\/\" rel=\"noopener\">Laurent Ballmeli<\/a><\/span>, CEO and co-founder of\u00a0<span style=\"text-decoration: underline;\"><a target=\"_blank\" href=\"https:\/\/strong.network\" rel=\"noopener\">Strong.Network<\/a><\/span><\/strong><\/h3>\n<hr \/>\n<p>&nbsp;<\/p>\n<div>\n<figure id=\"attachment_10444\" aria-describedby=\"caption-attachment-10444\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img decoding=\"async\" class=\"wp-image-10443 lazyload\" data-src=\"https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article.jpg\" alt=\"\" width=\"1000\" height=\"563\" data-srcset=\"https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article.jpg 1600w, https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article-300x169.jpg 300w, https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article-1024x576.jpg 1024w, https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article-768x432.jpg 768w, https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article-1536x864.jpg 1536w, https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article-350x197.jpg 350w\" data-sizes=\"(max-width: 1000px) 100vw, 1000px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1000px; --smush-placeholder-aspect-ratio: 1000\/563;\" \/><figcaption id=\"caption-attachment-10444\" class=\"wp-caption-text\">Image generated by DALL-E<\/figcaption><\/figure>\n<\/div>\n<div><\/div>\n<div class=\"blog-article\">\n<p><span style=\"font-weight: 400;\">Despite the use of Cloud or internal data servers, why is it still necessary to secure developers&#8217; laptops? With a first article on this subject, I explain why even today, your developers are likely the weak link in protecting your data. To fully grasp this often overlooked, obscure issue, here&#8217;s a brief historical overview of the enterprise data storage evolution and how we got to the point.<\/span><\/p>\n<p><b>Why Is There a Need for Secure Laptops in Development?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The need to secure laptops in organizations stems from the company data they carry. Moreover, this security issue has multiple facets, ranging from careless data management to intentional leakage by a malicious employee.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the case of laptops intended for application development, the complexity of securing them is linked to the nature of the developer&#8217;s environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Development environments have notoriously complex configurations and often require significant maintenance. This is due to the numerous applications and data present in internal storage. The presence of this data is independent of online tools also used for collaboration, building, and deploying applications, such as CI\/CD tools, Azure DevOps, and other platforms including GitHub, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Notably, in the case of development laptops, confidential information must be stored locally to facilitate the work of developers. Info such as source code, and potentially test data (or even more concerning, &#8220;anonymized&#8221; data), as well as access credentials, are therefore at risk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is why companies need to secure developers&#8217; laptops.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>A<\/b><b> Billion-Dollar Problem<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A quick look back at the issue of laptop security: a 2010 study titled &#8220;<\/span><a href=\"https:\/\/www.theregister.com\/2010\/12\/03\/intel_laptop_security_panel\/\"><span style=\"font-weight: 400;\">The Billion Dollar Lost Laptop Problem<\/span><\/a><span style=\"font-weight: 400;\">&#8221; reveals that over 86,000 stolen or lost computers resulted in a loss of $2.1 billion. This was mainly due to the loss of data stored locally, on laptops. However, it&#8217;s essential to remember that in 2010, using the Cloud as a storage medium for enterprise data was still rare. Therefore, this cost should be reevaluated and adjusted to today&#8217;s economy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, for many functions (other than development), the Cloud provides a solution by removing sensitive data from laptops through the use of web applications, such that users are able to access it remotely. For example, client data used for sales, as well as most documents and employee emails, are now stored online in the Cloud and accessed via the web.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For this reason, this migration has shifted the debate from laptop security to protecting credentials that allow access to these corporate resources, whether they are in the Cloud or self-hosted. With the progression of this digital disruption, a significant amount of data stored locally on laptops has vanished.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, there is a notable exception to this migration: laptops used for application development.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As mentioned earlier, in most cases (I&#8217;ll address exceptions later), laptops provided to developers today require a local replica of the source code, work data, access credentials, and other corporate secrets. In particular, the use of online storage for source code, such as GitHub or GitLab, does not address this need because a local copy of the data is still required for developers to do their job! Therefore, the interest for companies to provide secure enterprise laptops to developers has not diminished with the use of the Cloud.<\/span><\/p>\n<p><b>What Is the Incentive in Targeting Developers?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The incentive is quite diverse. For example, to gain access to intellectual property, source code, client data, strategic company information, etc. Source code in particular often reveals vulnerabilities in the application that it implements. This could be an internal application or one delivered to a client. It is vulnerable to an attack, even remotely, if deployed in the Cloud. Once compromised, it can provide access to sensitive data such as personal user information. Many <\/span><a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-lastpass-annonce-le-vol-d-une-partie-de-son-code-source-87803.html\"><span style=\"font-weight: 400;\">entities such as LastPass<\/span><\/a><span style=\"font-weight: 400;\"> (a password manager), <\/span><a href=\"https:\/\/www.cnbc.com\/2021\/01\/22\/tesla-sues-former-employee-for-allegedly-stealing-software-code.html\"><span style=\"font-weight: 400;\">Tesla<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/techcrunch.com\/2022\/03\/23\/microsoft-lapsus-hack-source-code\/\"><span style=\"font-weight: 400;\">Microsoft<\/span><\/a><span style=\"font-weight: 400;\">, and even the <\/span><a href=\"https:\/\/www.letemps.ch\/economie\/vol-de-donnees-suisses-sensibles-le-darknet-n-oublie-jamais\"><span style=\"font-weight: 400;\">Swiss Confederation<\/span><\/a><span style=\"font-weight: 400;\"> have recently fallen victim to various cyber-attacks exploiting the information such as described above. In addition, many <\/span><a href=\"https:\/\/www.letemps.ch\/economie\/cyber\/chronique-dune-suisse-ravagee-cyberattaques\"><span style=\"font-weight: 400;\">Swiss companies<\/span><\/a><span style=\"font-weight: 400;\"> are hacked daily using application vulnerabilities or via phishing, malware, or internal threats from employees&#8217; and developers&#8217; laptops.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Despite this, few companies today can accurately identify the precise location and nature of their development-related data. Consequently, they are poorly informed and protected against laptop loss, an external attack, or an unscrupulous employee.<\/span><\/p>\n<p><b>Is It Possible to Remove Development Data From Laptops?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A typical solution is to have the developer work on a remote machine, or a &#8220;remote desktop.&#8221; For example, on a virtual machine in the Cloud. This removes a lot of locally stored data-related risks (with the exception of access credentials). Unfortunately, this solution has many drawbacks, especially when it comes to the way working on a remote machine reflects on developer productivity. Moreover, it is complex to implement, as well as expensive to maintain and operate. More importantly, it has no benefit regarding protection against phishing, malware or Insider threat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It was only recently, with advances in <\/span><a href=\"https:\/\/strong.network\/what-are-cdes\"><span style=\"font-weight: 400;\">new virtualization technologies<\/span><\/a><span style=\"font-weight: 400;\">, that companies became able to replace these generic solutions such as &#8220;remote desktops&#8221; with a new approach. One that is aimed at minimizing the impact on productivity, reducing costs, and increasing security, all tailored to the needs of a<\/span> <i><span style=\"font-weight: 400;\">developer<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This new approach and its history will be the subject of my next article. Find out more articles on the subject at <\/span><a href=\"https:\/\/strong.network\/resources\/blog\"><span style=\"font-weight: 400;\">https:\/\/strong.network\/resources\/blog<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<div class=\"blog-article\">\n<hr \/>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400;\"><strong>About Strong.Network<\/strong><\/p>\n<p style=\"font-weight: 400;\">Strong Network is an award-winning cybersecurity company (<span style=\"text-decoration: underline;\"><a target=\"_blank\" href=\"https:\/\/trustvalley.swiss\/2021\/04\/27\/les-gagnants-tech4trust-2eme-saison\/\" rel=\"noopener\">runner of Tech4Trust Season 2<\/a><\/span>) providing highly secure workspaces for code development across various industries. The company is dedicated to revolutionizing secure code development by enabling teams to quickly deploy secure development environments. This effort focuses on maintaining the integrity of valuable digital assets while boosting DevOps efficiency<\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/strong.network\">strong.network<\/a><\/span><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Developer: the Weakest and Overlooked Link in Enterprise Data Security Guest post by\u00a0Laurent Ballmeli, CEO and co-founder of\u00a0Strong.Network &nbsp; [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":10443,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-10464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Developer: Weakest Link in Data Security| Trust Valley<\/title>\n<meta name=\"description\" content=\"Find out why the developer is the weakest link in enterprise data security and how to fix it in this guest article\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Developer: Weakest Link in Data Security| Trust Valley\" \/>\n<meta property=\"og:description\" content=\"Find out why the developer is the weakest link in enterprise data security and how to fix it in this guest article\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Trust Valley\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-30T10:44:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Josua Rochat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Josua Rochat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/\"},\"author\":{\"name\":\"Josua Rochat\",\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/#\\\/schema\\\/person\\\/6e2da72fed321a1ef68c12c4a196167b\"},\"headline\":\"The Developer: the Weakest and Overlooked Link in Enterprise Data Security\",\"datePublished\":\"2023-11-30T10:44:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/\"},\"wordCount\":979,\"image\":{\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trustvalley.swiss\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/strong-network-trust-valley-article.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/\",\"url\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/\",\"name\":\"Developer: Weakest Link in Data Security| Trust Valley\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trustvalley.swiss\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/strong-network-trust-valley-article.jpg\",\"datePublished\":\"2023-11-30T10:44:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/#\\\/schema\\\/person\\\/6e2da72fed321a1ef68c12c4a196167b\"},\"description\":\"Find out why the developer is the weakest link in enterprise data security and how to fix it in this guest article\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/trustvalley.swiss\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/strong-network-trust-valley-article.jpg\",\"contentUrl\":\"https:\\\/\\\/trustvalley.swiss\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/strong-network-trust-valley-article.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/2023\\\/11\\\/30\\\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Developer: the Weakest and Overlooked Link in Enterprise Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/\",\"name\":\"Trust Valley\",\"description\":\"Trust Valley\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/trustvalley.swiss\\\/en\\\/#\\\/schema\\\/person\\\/6e2da72fed321a1ef68c12c4a196167b\",\"name\":\"Josua Rochat\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8e0b8a8a8ec54b2bb16ef2a96192762b8399904670e5c9a42d90849cc9184a80?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8e0b8a8a8ec54b2bb16ef2a96192762b8399904670e5c9a42d90849cc9184a80?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8e0b8a8a8ec54b2bb16ef2a96192762b8399904670e5c9a42d90849cc9184a80?s=96&d=mm&r=g\",\"caption\":\"Josua Rochat\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Developer: Weakest Link in Data Security| Trust Valley","description":"Find out why the developer is the weakest link in enterprise data security and how to fix it in this guest article","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/","og_locale":"en_US","og_type":"article","og_title":"Developer: Weakest Link in Data Security| Trust Valley","og_description":"Find out why the developer is the weakest link in enterprise data security and how to fix it in this guest article","og_url":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/","og_site_name":"Trust Valley","article_published_time":"2023-11-30T10:44:30+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article.jpg","type":"image\/jpeg"}],"author":"Josua Rochat","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Josua Rochat","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/#article","isPartOf":{"@id":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/"},"author":{"name":"Josua Rochat","@id":"https:\/\/trustvalley.swiss\/en\/#\/schema\/person\/6e2da72fed321a1ef68c12c4a196167b"},"headline":"The Developer: the Weakest and Overlooked Link in Enterprise Data Security","datePublished":"2023-11-30T10:44:30+00:00","mainEntityOfPage":{"@id":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/"},"wordCount":979,"image":{"@id":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/","url":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/","name":"Developer: Weakest Link in Data Security| Trust Valley","isPartOf":{"@id":"https:\/\/trustvalley.swiss\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/#primaryimage"},"image":{"@id":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article.jpg","datePublished":"2023-11-30T10:44:30+00:00","author":{"@id":"https:\/\/trustvalley.swiss\/en\/#\/schema\/person\/6e2da72fed321a1ef68c12c4a196167b"},"description":"Find out why the developer is the weakest link in enterprise data security and how to fix it in this guest article","breadcrumb":{"@id":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/#primaryimage","url":"https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article.jpg","contentUrl":"https:\/\/trustvalley.swiss\/wp-content\/uploads\/2023\/11\/strong-network-trust-valley-article.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/trustvalley.swiss\/en\/2023\/11\/30\/the-developer-the-weakest-and-overlooked-link-in-enterprise-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/trustvalley.swiss\/en\/"},{"@type":"ListItem","position":2,"name":"The Developer: the Weakest and Overlooked Link in Enterprise Data Security"}]},{"@type":"WebSite","@id":"https:\/\/trustvalley.swiss\/en\/#website","url":"https:\/\/trustvalley.swiss\/en\/","name":"Trust Valley","description":"Trust Valley","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustvalley.swiss\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/trustvalley.swiss\/en\/#\/schema\/person\/6e2da72fed321a1ef68c12c4a196167b","name":"Josua Rochat","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8e0b8a8a8ec54b2bb16ef2a96192762b8399904670e5c9a42d90849cc9184a80?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8e0b8a8a8ec54b2bb16ef2a96192762b8399904670e5c9a42d90849cc9184a80?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8e0b8a8a8ec54b2bb16ef2a96192762b8399904670e5c9a42d90849cc9184a80?s=96&d=mm&r=g","caption":"Josua Rochat"}}]}},"_links":{"self":[{"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/posts\/10464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/comments?post=10464"}],"version-history":[{"count":1,"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/posts\/10464\/revisions"}],"predecessor-version":[{"id":10465,"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/posts\/10464\/revisions\/10465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/media\/10443"}],"wp:attachment":[{"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/media?parent=10464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/categories?post=10464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustvalley.swiss\/en\/wp-json\/wp\/v2\/tags?post=10464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}