article thumbnail

Modus Security: What’s Your Threat Surface?

Modus Create

The news is filled with tales of hackers breaking into financial institutions, DDoS attacks on credit card companies, and data breaches due to poor software configuration. Phase 1: Due Diligence and Discovery. Due diligence comes first but has its origins in other engagements Modus has conducted over the years.

article thumbnail

Should Your Sales Team Sell Features Before They Exist?

Fearless Product

SHOULD THE SALES TEAM SELL FEATURES BEFORE THEY EXIST? Are you a B2B product leader wondering how you can help the sales team achieve their targets while not backing your product team into corner? Share what was most useful to you by leaving a review. SHOULD THE SALES TEAM SELL FEATURES BEFORE THEY EXIST?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Should Your Sales Team Sell Features Before They Exist?

Fearless Product

SHOULD THE SALES TEAM SELL FEATURES BEFORE THEY EXIST? Are you a B2B product leader wondering how you can help the sales team achieve their targets while not backing your product team into corner? Share what was most useful to you by leaving a review. SHOULD THE SALES TEAM SELL FEATURES BEFORE THEY EXIST?

article thumbnail

Should Your Sales Team Sell Features Before They Exist?

Fearless Product

SHOULD THE SALES TEAM SELL FEATURES BEFORE THEY EXIST? Are you a B2B product leader wondering how you can help the sales team achieve their targets while not backing your product team into corner? Share what was most useful to you by leaving a review. SHOULD THE SALES TEAM SELL FEATURES BEFORE THEY EXIST?

article thumbnail

How to Prepare Banks for Digital Transformation

The Product Coalition

“The digital transformation of any enterprise is a herculean task requiring a willingness to embrace cultural change, the ability to immerse the entire organization in the customer journey, and a total commitment to digitize to the core”?—? To begin with, the development of new functionality requires considerable resources, including people.

Banking 90
article thumbnail

Security Assessment: Introduction, Process, and More

Modus Create

Here’s what a comprehensive security assessment looks like: Step 1 – Due Diligence. SDLC (Software Development Life Cycle) of the organization . VAST – (Visual, Agile, and Simple Threat) – Perspective of the organization. A source code review helps find and fix such errors.

article thumbnail

When to Declare Backlog Bankruptcy

ProductPlan

A few years ago, I was the acting product manager at a startup, developing an enterprise software product. Building the product was hard: it was taking longer to develop than everyone expected (of course). I heard requests from customers, domain experts, consultants, our development team, and internal stakeholders.