Application Software Security and the CIS Controls Sofya Howard2021-05-18T10:39:26-04:00 Application Software Security and the CIS ControlsSofya Howard2021-05-18T10:39:26-04:00
Software Security and the CIS Controls: New Guidance Available Sofya Howard2021-12-28T13:48:09-05:00 Software Security and the CIS Controls: New Guidance AvailableSofya Howard2021-12-28T13:48:09-05:00
Software Security and the Cybersecurity Executive Order Sofya Howard2021-12-28T13:48:18-05:00 Software Security and the Cybersecurity Executive OrderSofya Howard2021-12-28T13:48:18-05:00
How Agile Is Your Cryptographic Strategy? Sofya Howard2021-04-14T15:58:50-04:00 How Agile Is Your Cryptographic Strategy?Sofya Howard2021-04-14T15:58:50-04:00
Identifying Your Cryptographic Dependencies Scott Licata2021-03-12T16:57:04-05:00 Identifying Your Cryptographic DependenciesScott Licata2021-03-12T16:57:04-05:00
Security Training Manifesto Rebecca Nadeau2021-09-23T10:49:05-04:00 Security Training ManifestoRebecca Nadeau2021-09-23T10:49:05-04:00
SAFECode and PCI SSC Discuss the Evolution of Secure Software Rebecca Nadeau2021-12-28T13:49:31-05:00 SAFECode and PCI SSC Discuss the Evolution of Secure SoftwareRebecca Nadeau2021-12-28T13:49:31-05:00
Preparing for PQC: Roadmap & Initial Guidance Rebecca Nadeau2022-09-30T15:44:54-04:00 Preparing for PQC: Roadmap & Initial GuidanceRebecca Nadeau2022-09-30T15:44:54-04:00
OpenSSF Releases Free EdX Secure Development Courses Rebecca Nadeau2021-09-23T10:57:11-04:00 OpenSSF Releases Free EdX Secure Development CoursesRebecca Nadeau2021-09-23T10:57:11-04:00
Untangling Supply Chain Security Rebecca Nadeau2020-10-08T09:02:06-04:00 Untangling Supply Chain SecurityRebecca Nadeau2020-10-08T09:02:06-04:00