Forrester Consulting: Bridging The Developer and Security Divide
As security professionals work to create a secure environment for organizations, developers are often left out of security planning processes but are then tasked with carrying these procedures out. This creates a fractured relationship between development and security. While senior leaders are more focused now on development and security relationships, one in three don't effectively collaborate or work to strengthen relationships. Forrester conducted a survey with 1,475 respondents and five interviews with IT, security, and development managers and above (including CIOs and CISOs) with responsibility for development or security strategy decision-making to explore this topic. We found that, despite efforts, teams continue to struggle with negative relationships and a lack of empathy while often failing to include development teams in security strategy and planning. This report provides deeper insights into that study.
Read More
By submitting this form you agree to VMware contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. VMware web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: Applications, Cloud, Cloud Security, Collaboration, Compliance, Connectivity, DevOps, Employee Experience, ERP, Network, Network Security, Open Source, Security Solutions, Software


More resources from VMware

Cloud Security: From Start Point to End Point...
Cloud computing offers organisations competitive advantages such as increased speed, agility, scale and collaboration. But what often happens in th...

Eight Critical Practice Areas That Drive Mult...
While most organizations are already using two or more clouds, most teams within the larger organization are still focused on using primarily one c...

An Evaluator's Guide to Cloud-Based NGAV The ...
Since it was first introduced in the late 1980s, antivirus (AV) has been the first line of defense against known malware.
Traditional AV reli...