Dec. 1, 2022, 2:10 a.m. | Arina Kudriavtseva, Olga Gadyatskaya

cs.CR updates on arXiv.org arxiv.org

In recent years, the number of cyber attacks has grown rapidly. An effective
way to reduce the attack surface and protect software is adoption of
methodologies that apply security at each step of the software development
lifecycle. While different methodologies have been proposed to address software
security, recent research shows an increase in the number of vulnerabilities in
software and data breaches. Therefore, the security practices incorporated in
secure software development methodologies require investigation. This paper
provides an overview of …

development literature review secure software software software development

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Advisory Red Consultant

@ Security Risk Advisors | Philadelphia, Pennsylvania, United States

Cyber Business Transformation Change Analyst

@ National Grid | Warwick, GB, CV34 6DA

Cyber Security Analyst

@ Ford Motor Company | Mexico City, MEX, Mexico

Associate Administrator, Cyber Security Governance (Fort Myers)

@ Millennium Physician Group | Fort Myers, FL, United States

Embedded GSOC Lead Operator, Events

@ Sibylline Ltd | Seattle, WA, United States