If you lead a software development team you are obviously familiar with Software development Life Cycles (SDLC) methodologies. But it doesn’t matter if you have adopted the Waterfall, V-shaped, Iterative, Spiral, Big Bang or an Agile model, as they will all need some adaptation for security, especially as more cyberattacks are reported daily.

Read full post here →