Agile and iterative methodologies focusing on re factoring, team co-location, and automated testing, seem to run counter to the view of traditional security methodologies [1].
Agile and iterative methodologies focusing on re factoring,team co-location, and automated testing, seem to runcounter to the view of traditional security methodologies[1].