From a cyber security perspective, what would you do to implement a good security model relative to the SDLC? Would you build the SDLC first and then include cyber security (hardware/software) components, or integrate this at the outset? Your post can be from a conceptual perspective or a technical one.
Comments
Leave a comment