Skip to content
Jessica Carvalho2023-06-21T15:41:16-04:00
Threat Modeling at ScaleJessica Carvalho2023-06-21T15:41:16-04:00
Jessica Carvalho2023-06-06T15:53:40-04:00
Secure by Design? The U.S. Government and Requirements for Secure DevelopmentJessica Carvalho2023-06-06T15:53:40-04:00
Jessica Carvalho2023-04-24T14:06:00-04:00
Thoughts on Executive Order 14028: Attestation and Software SecurityJessica Carvalho2023-04-24T14:06:00-04:00
Zach Dake2023-02-13T11:39:31-05:00
Navigate the Executive Order 14028 Era of Software SecurityZach Dake2023-02-13T11:39:31-05:00
Zach Dake2022-11-08T14:14:22-05:00
Security Capabilities to Support Code IntegrityZach Dake2022-11-08T14:14:22-05:00
Scott Licata2022-07-29T11:44:32-04:00
Oracle Joins SAFECode; Raytheon Accepts Board SeatScott Licata2022-07-29T11:44:32-04:00
Max Zhou2022-04-26T15:26:19-04:00
The Implications of Post Quantum Cryptography for Software Supply Chain SecurityMax Zhou2022-04-26T15:26:19-04:00
Zach Dake2022-04-12T13:03:18-04:00
Code Integrity PrinciplesZach Dake2022-04-12T13:03:18-04:00
Huda Hawasli2022-03-15T10:28:05-04:00
Celebrating Our Members on SAFECode DayHuda Hawasli2022-03-15T10:28:05-04:00
Jessica Carvalho2022-03-14T10:00:58-04:00
Cybersecurity Nonprofits Form “Nonprofit Cyber” CoalitionJessica Carvalho2022-03-14T10:00:58-04:00
Page load link