paint-brush
Security For PMs: How-To [Part II]by@liuka_l
106 reads

Security For PMs: How-To [Part II]

by [email protected]5mSeptember 22nd, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Security For PMs: How-To [Part II] explains how to ensure that your security practices are working. Don't neglect taking the time on the very first stages of the project to write the security requirements. Creating a one-pager with basic rules is much cheaper than re-doing the whole product. The earlier you start implementing security practices, the cheaper they will be. Don't be afraid to bring up this topic, be honest and don't be shy to invite the security experts from your client.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Security For PMs: How-To [Part II]
lobarieva.liuka@gmail.com HackerNoon profile picture

Tech PR enthusiast at datuum.ai

About @liuka_l
LEARN MORE ABOUT @LIUKA_L'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

lobarieva.liuka@gmail.com HackerNoon profile picture
[email protected]@liuka_l
Tech PR enthusiast at datuum.ai

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite