Skip to content
Blog
Scott Licata2022-02-01T10:59:20-05:00
SAFECode’s Cybersecurity Executive Order Working Group: A Chat with SAFECode Executive Director Steve LipnerScott Licata2022-02-01T10:59:20-05:00
Blog
Sofya Howard2022-04-12T12:32:24-04:00
The Importance of Code IntegritySofya Howard2022-04-12T12:32:24-04:00
Blog
Scott Licata2021-08-10T16:48:49-04:00
Strategies for Achieving Crypto AgilityScott Licata2021-08-10T16:48:49-04:00
Blog
Sofya Howard2021-12-28T13:34:02-05:00
Secure Code is Not Just About Secure Development: The Need for Code IntegritySofya Howard2021-12-28T13:34:02-05:00
Blog
Sofya Howard2021-12-28T13:48:09-05:00
Software Security and the CIS Controls: New Guidance AvailableSofya Howard2021-12-28T13:48:09-05:00
Blog
Sofya Howard2021-12-28T13:48:18-05:00
Software Security and the Cybersecurity Executive OrderSofya Howard2021-12-28T13:48:18-05:00
Blog
Sofya Howard2021-04-14T15:58:50-04:00
How Agile Is Your Cryptographic Strategy?Sofya Howard2021-04-14T15:58:50-04:00
Blog
Scott Licata2021-03-12T16:57:04-05:00
Identifying Your Cryptographic DependenciesScott Licata2021-03-12T16:57:04-05:00
Blog
Rebecca Nadeau2021-09-23T10:49:05-04:00
Security Training ManifestoRebecca Nadeau2021-09-23T10:49:05-04:00
Blog
Rebecca Nadeau2021-12-28T13:49:31-05:00
SAFECode and PCI SSC Discuss the Evolution of Secure SoftwareRebecca Nadeau2021-12-28T13:49:31-05:00
Load More Posts
Page load link