In the current digitalised society keeping assets secure is one of the most prominent challenges organisations face. In the ongoing arms race between attackers and defenders, software security patching is a well-recognised and effective strategy to mitigate vulnerabilities in software products. However, organisations struggle with the best practice to “patch early and often”, resulting in vulnerabilities in software being exposed for much longer than desired. Prior research indicates the socio-technical nature of this practice forms the core of delays in software patch management. Developing a deeper understanding of the decision-making of IT practitioners and what socio-technical factors play a role in this process allows organisations to ...
This thesis investigates four different aspects of information security management: challenges faced...
To what extent do investments in secure software engineering pay off? Right now, many development co...
Numerous security attacks that resulted in devastating consequences can be traced back to a delay in...
Several security attacks that resulted in catastrophic outcomes including system downtime, data bre...
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.Software ofte...
Cyber-attacks are growing more frequent and sophisticated, and they are impacting businesses of all ...
To what extent do investments in secure software engineering pay off? Right now, many development co...
peer reviewedInspired by the root cause analysis procedures common in safety, we propose a methodolo...
Security of information technology (IT) has become a critical issue for organizations as they must p...
This thesis investigates four different aspects of information security management: challenges faced...
This thesis examines the concepts of Information System (IS) security assurance using a socio-techni...
YesThe increase in cybersecurity threats and the challenges for organisations to protect their infor...
As software security becomes vital, how are organizations adapting to the challenge? This article ex...
Abstract: Computer software is ubiquitous and is driven extensively by our information-based society...
Abstract: Despite the emergence of artificial intelligence-powered enterprise systems security solut...
This thesis investigates four different aspects of information security management: challenges faced...
To what extent do investments in secure software engineering pay off? Right now, many development co...
Numerous security attacks that resulted in devastating consequences can be traced back to a delay in...
Several security attacks that resulted in catastrophic outcomes including system downtime, data bre...
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.Software ofte...
Cyber-attacks are growing more frequent and sophisticated, and they are impacting businesses of all ...
To what extent do investments in secure software engineering pay off? Right now, many development co...
peer reviewedInspired by the root cause analysis procedures common in safety, we propose a methodolo...
Security of information technology (IT) has become a critical issue for organizations as they must p...
This thesis investigates four different aspects of information security management: challenges faced...
This thesis examines the concepts of Information System (IS) security assurance using a socio-techni...
YesThe increase in cybersecurity threats and the challenges for organisations to protect their infor...
As software security becomes vital, how are organizations adapting to the challenge? This article ex...
Abstract: Computer software is ubiquitous and is driven extensively by our information-based society...
Abstract: Despite the emergence of artificial intelligence-powered enterprise systems security solut...
This thesis investigates four different aspects of information security management: challenges faced...
To what extent do investments in secure software engineering pay off? Right now, many development co...
Numerous security attacks that resulted in devastating consequences can be traced back to a delay in...