Implementing Security Activities across the Technology Life Cycle