Evidence from data breach reports shows that many competent software development teams still do not implement secure, privacy-preserving software, even though techniques to do so are now well-known. A major factor causing this is simply a lack of priority and resources for security, as decided by product managers. So, how can we help developers and product managers to work together to achieve appropriate decisions on security and privacy issues? This paper explores using structured workshops to support teams of developers in engaging product managers with software security and privacy, even in the absence of security professionals. The research used the Design Based Research methodology. This paper describes and justifies our workshop desig...
This paper describes materials developed to engage professional developers in discussions about secu...
This paper describes materials developed to engage professional developers in discussions about secu...
Cyber security is a big and increasing problem. Almost every week we hear of a new exploit or securi...
Evidence from data breach reports shows that many competent software development teams still do not ...
While the techniques to achieve secure, privacypreserving software are now well understood, evidence...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
A series of interventions costing less than two days’ total effort from a facilitator can significan...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
Many software developers still have little interest in software security. To change this, we need ‘i...
This paper describes materials developed to engage professional developers in discussions about secu...
This paper describes materials developed to engage professional developers in discussions about secu...
Cyber security is a big and increasing problem. Almost every week we hear of a new exploit or securi...
Evidence from data breach reports shows that many competent software development teams still do not ...
While the techniques to achieve secure, privacypreserving software are now well understood, evidence...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
A series of interventions costing less than two days’ total effort from a facilitator can significan...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
Though some software development teams are highly effective at delivering security, others either do...
Many software developers still have little interest in software security. To change this, we need ‘i...
This paper describes materials developed to engage professional developers in discussions about secu...
This paper describes materials developed to engage professional developers in discussions about secu...
Cyber security is a big and increasing problem. Almost every week we hear of a new exploit or securi...