Skip to content

Are You Willing to Risk Your Security by Skipping SDL? | Intel Technology

Play Video


Should you separate software development and security in the product development lifecycle?

In this Cyber Security Inside video, Tom and Camille talk with Harshil Parikh. They get into the connection between software development and security and the numerous potentials that come with it. When structured right, this relationship can completely transform the SDL of every organization. 


The Chasm Between Software Development and Security

In today’s rapid development environment, developers are empowered to make decisions that prioritize speed. They are allowed to use their technology stack and deploy as they wish. Essentially, the goal is to gain a competitive advantage through faster time-to-market. 

Although this decision shortens the product development lifecycle, it puts security in the back seat. It also increases the risk of spotting vulnerabilities too late. 

Instead of that scenario, it’s time to integrate software development and security into the entire development lifecycle. This integration will ensure that organizations get to the market faster with highly secure products.


Harshil Parikh: The SDL Automation Expert for Software Development and Security

Harshil Parikh- software development and security


Harshil Parikh is the founder and CEO of Tromzo, which is an application security management platform automating SDL. He is experienced in building security and compliance from the group up and scaling it with people, processes, and technology.

View Harshil’s LinkedIn page



Check it out. For more information, previous podcasts, and full versions, visit our homepage.

To read more about cybersecurity topics, visit our blog.

#softwaredevelopment #security #sdl 

The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.


If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms: Apple Podcast and Spotify.

Follow our hosts Tom Garrison @tommgarrison and Camille @morhardt.

Learn more about Intel Cybersecurity and Intel Compute Life Cycle (CLA).