I’ve recently posted two pieces of content on other platforms:
Tag: security
Security backlash in the henhouse
When cloud services disappear
Two recent posts
How Information Gets Stolen
I just found a very interesting article from the software engineering institute on how information gets stolen by insiders. Did you know that: E-mail is the most common method of exfiltration. Almost all thieves are men. Most information thieves steal from IT and telecom company. Most thefts happen within 30…
Does Agile lead to secure software?
According to some Norwegian researchers, agile software development in small and medium sized enterprises does not result in more secure software. Their solution is to make some ‘extensions’ to agile development methodology. I am sceptical. I think it would be a matter of how the agile methods are applied not…
Security backlash in the henhouse
When cloud services disappear
Two recent posts
How Information Gets Stolen
I just found a very interesting article from the software engineering institute on how information gets stolen by insiders. Did you know that: E-mail is the most common method of exfiltration. Almost all thieves are men. Most information thieves steal from IT and telecom company. Most thefts happen within 30…
Does Agile lead to secure software?
According to some Norwegian researchers, agile software development in small and medium sized enterprises does not result in more secure software. Their solution is to make some ‘extensions’ to agile development methodology. I am sceptical. I think it would be a matter of how the agile methods are applied not…