Skip to content
Blog
Huda Hawasli2022-03-15T10:28:05-04:00
Celebrating Our Members on SAFECode DayHuda Hawasli2022-03-15T10:28:05-04:00
Blog
Jessica Carvalho2022-03-14T10:00:58-04:00
Cybersecurity Nonprofits Form “Nonprofit Cyber” CoalitionJessica Carvalho2022-03-14T10:00:58-04:00
Blog
Scott Licata2022-02-01T10:59:20-05:00
SAFECode’s Cybersecurity Executive Order Working Group: A Chat with SAFECode Executive Director Steve LipnerScott Licata2022-02-01T10:59:20-05:00
Blog
Sofya Howard2022-04-12T12:32:24-04:00
The Importance of Code IntegritySofya Howard2022-04-12T12:32:24-04:00
Blog
Scott Licata2021-08-10T16:48:49-04:00
Strategies for Achieving Crypto AgilityScott Licata2021-08-10T16:48:49-04:00
Blog
Sofya Howard2021-12-28T13:34:02-05:00
Secure Code is Not Just About Secure Development: The Need for Code IntegritySofya Howard2021-12-28T13:34:02-05:00
Blog
Sofya Howard2021-12-28T13:48:09-05:00
Software Security and the CIS Controls: New Guidance AvailableSofya Howard2021-12-28T13:48:09-05:00
Blog
Sofya Howard2021-12-28T13:48:18-05:00
Software Security and the Cybersecurity Executive OrderSofya Howard2021-12-28T13:48:18-05:00
Blog
Sofya Howard2021-04-14T15:58:50-04:00
How Agile Is Your Cryptographic Strategy?Sofya Howard2021-04-14T15:58:50-04:00
Blog
Scott Licata2021-03-12T16:57:04-05:00
Identifying Your Cryptographic DependenciesScott Licata2021-03-12T16:57:04-05:00
Load More Posts
Page load link