Better Security Outcomes with Abuser Stories for Scrum Teams

“What on earth is an Abuser Story?”

“What’s the point of an Abuser Story?”

Security in the SDLC

“Great, How can I use Abuser Stories in my Agile Team? Spare me no details….”

“Alright, now I have Abuser Stories…What next??”

In Conclusion…

--

--

--

CTO of we45 (An AppSec Company), DevSecOps Greasemonkey, Passionate Security Technologist and Creator

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Chaos-based stream ciphers power the future for concentrated & cost-efficient cryptosystems

2fa Bypass Using Response Manipulation

The inequality in the distribution of wealth in the contemporary world, which is following the…

Crypto Quotes Now Available in Power Apps & Power Automate via the Aletheia Connector

Introduction to Public Key Cryptography

Introducing TronSecure AI Trading bot

Email Security: How to protect your correspondence

{UPDATE} Car Roof Jumping Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Abhay Bhargav

Abhay Bhargav

CTO of we45 (An AppSec Company), DevSecOps Greasemonkey, Passionate Security Technologist and Creator

More from Medium

Git workflow for infrastructure (infra workflow)

Agile vs DevOps

How to Build and Deliver Apps Fast and Scalable with Azure Container Apps

eBPF: Modern Security for Modern Environments