Navigate the Executive Order 14028 Era of Software Security Publication Zach Dake2023-02-13T11:39:31-05:00 Navigate the Executive Order 14028 Era of Software SecurityZach Dake2023-02-13T11:39:31-05:00
Application Software Security and the CIS Controls Publication Sofya Howard2021-05-18T10:39:26-04:00 Application Software Security and the CIS ControlsSofya Howard2021-05-18T10:39:26-04:00
The Six Pillars of DevSecOps: Automation Publication Rebecca Nadeau2020-07-07T09:58:01-04:00 The Six Pillars of DevSecOps: AutomationRebecca Nadeau2020-07-07T09:58:01-04:00
Fundamental Practices for Secure Software Development, Third Edition Publication Evander Pierre2020-09-02T13:06:27-04:00 Fundamental Practices for Secure Software Development, Third EditionEvander Pierre2020-09-02T13:06:27-04:00
The Six Pillars of DevSecOps: Collective Responsibility Publication Scott Licata2020-06-19T10:20:34-04:00 The Six Pillars of DevSecOps: Collective ResponsibilityScott Licata2020-06-19T10:20:34-04:00
Software Security Takes a Champion Publication Scott Licata2020-09-02T13:07:07-04:00 Software Security Takes a ChampionScott Licata2020-09-02T13:07:07-04:00
SAFECode Comments on EU Cybersecurity Legislation Publication Scott Licata2020-06-19T12:54:05-04:00 SAFECode Comments on EU Cybersecurity LegislationScott Licata2020-06-19T12:54:05-04:00
Principles for Software Assurance Assessment Publication Scott Licata2020-06-19T12:53:47-04:00 Principles for Software Assurance AssessmentScott Licata2020-06-19T12:53:47-04:00
Tactical Threat Modeling Publication Scott Licata2020-09-02T13:04:34-04:00 Tactical Threat ModelingScott Licata2020-09-02T13:04:34-04:00
Managing Security Risks Inherent in the Use of Third-party Components Publication Scott Licata2020-09-02T13:08:00-04:00 Managing Security Risks Inherent in the Use of Third-party ComponentsScott Licata2020-09-02T13:08:00-04:00