For organizations to be able to build digital products that are as secure as possible for their customers, security must be implemented in every phase of the software development life cycle. Good application security management and security improvements require good visibility of security activities in the SDLC. This research studied visibility in application security, and what factors are important to consider when aiming to improve visibility. The action research method was used in this study. The theoretical part consists of an introduction to modern software development, DevOps practices and security automation, where visibility is needed. The section also demonstrates the standards and certifications widely used in the field, as we...
Abstract: Secure software development practices adoption could be the most influential factor for th...
Organisations understand that cybersecurity is a critical issue to address to protect their interest...
The main purpose of this paper is to explore the best practices that can be adopted to ensure securi...
With the rapid advancement of technology, society’s reliance on computers and the internet has incre...
The advancement of technology has made the development of software applications become unstoppabl...
Especially in software development information security is an everlasting race against changing thre...
With the growth of software flaws there is a rise in the demand of security embedding to achieve the...
For several years a trend in agile software development methodologies that connect the development w...
The Software Development Life Cycle (SDLC) cares for all steps to have a sound implementation of pro...
With the rapid growth of technology, the potential for data to be stolen has grown exponentially. Th...
Security certification is a critical factor for deploying IT systems in the federal government. It i...
Today’s software is more vulnerable to attacks due to increase in complexity, connectivity and exten...
Today’s software is more vulnerable to attacks due to increase in complexity, connectivity and exten...
Web application security and safety are important issues for all digital service users. The speed of...
Software Engineers do not implement security as a continuing process in software development; they g...
Abstract: Secure software development practices adoption could be the most influential factor for th...
Organisations understand that cybersecurity is a critical issue to address to protect their interest...
The main purpose of this paper is to explore the best practices that can be adopted to ensure securi...
With the rapid advancement of technology, society’s reliance on computers and the internet has incre...
The advancement of technology has made the development of software applications become unstoppabl...
Especially in software development information security is an everlasting race against changing thre...
With the growth of software flaws there is a rise in the demand of security embedding to achieve the...
For several years a trend in agile software development methodologies that connect the development w...
The Software Development Life Cycle (SDLC) cares for all steps to have a sound implementation of pro...
With the rapid growth of technology, the potential for data to be stolen has grown exponentially. Th...
Security certification is a critical factor for deploying IT systems in the federal government. It i...
Today’s software is more vulnerable to attacks due to increase in complexity, connectivity and exten...
Today’s software is more vulnerable to attacks due to increase in complexity, connectivity and exten...
Web application security and safety are important issues for all digital service users. The speed of...
Software Engineers do not implement security as a continuing process in software development; they g...
Abstract: Secure software development practices adoption could be the most influential factor for th...
Organisations understand that cybersecurity is a critical issue to address to protect their interest...
The main purpose of this paper is to explore the best practices that can be adopted to ensure securi...