Showing 1 - 10 of 12400 results
This guide provides an introduction to the key concepts, principles, and roles necessary to establish a successful Coordinated Vulnerability Disclosure process. It also provides insights into how CVD can go awry and how to respond when it does so.
So what is risk appetite? It is the amount and type of risk that an organization is willing to accept. In other words, risk appetite specifies value ranges for key performance indicators.
The CERT Secure Coding Team announces several open positions on its team in secure coding and software assurance.
We live in a software defined world. More and more of the capability and value we derive from our connected devices is achieved by software.
Watch Ipek Ozkaya in this Cyber Minute, as she recommends developers adopt a simple practice of reporting technical debt, including its potential accumulating side effects, as they discover or accrue that debt.
Nearly 2 billion vulnerable components are downloaded annually, and the average application has more than 20 open source vulnerabilities. Mark Sherman recommends the SPDO approach to secure open source components to diminish the risk and the impact.
The Hard Choices game is a simulation of the software development cycle meant to communicate the concepts of uncertainty, risk, and technical debt.
In this podcast, Carol Woody and Christopher Alberts introduce the prototype Software Assurance Framework, a collection of cybersecurity practices that programs can apply across the acquisition lifecycle and supply chain.
In this webinar we discussed the challenges facing the CRO role and about how CMU's new CRO program can help you address those challenges.
In this talk, I'll discuss how I used the Django web framework, in conjunction with Twitter Bootstrap, to quickly build complex business applications.