Skip to content
Sofya Howard2022-04-12T12:32:24-04:00
The Importance of Code IntegritySofya Howard2022-04-12T12:32:24-04:00
Scott Licata2021-08-10T16:48:49-04:00
Strategies for Achieving Crypto AgilityScott Licata2021-08-10T16:48:49-04:00
Sofya Howard2021-12-28T13:34:02-05:00
Secure Code is Not Just About Secure Development: The Need for Code IntegritySofya Howard2021-12-28T13:34:02-05:00
Sofya Howard2021-05-18T10:39:26-04:00
Application Software Security and the CIS ControlsSofya Howard2021-05-18T10:39:26-04:00
Sofya Howard2021-12-28T13:48:09-05:00
Software Security and the CIS Controls: New Guidance AvailableSofya Howard2021-12-28T13:48:09-05:00
Sofya Howard2021-12-28T13:48:18-05:00
Software Security and the Cybersecurity Executive OrderSofya Howard2021-12-28T13:48:18-05:00
Sofya Howard2021-04-14T15:58:50-04:00
How Agile Is Your Cryptographic Strategy?Sofya Howard2021-04-14T15:58:50-04:00
Scott Licata2021-03-12T16:57:04-05:00
Identifying Your Cryptographic DependenciesScott Licata2021-03-12T16:57:04-05:00
Rebecca Nadeau2021-09-23T10:49:05-04:00
Security Training ManifestoRebecca Nadeau2021-09-23T10:49:05-04:00
Rebecca Nadeau2021-12-28T13:49:31-05:00
SAFECode and PCI SSC Discuss the Evolution of Secure SoftwareRebecca Nadeau2021-12-28T13:49:31-05:00
Page load link