Supply Chain Risks in the Software Development Life Cycle In the aftermath of the Heartbleed vulnerability, the software […]
vulnerability management
Yes, of course it is! It is not however simple to design information systems with privacy in mind […]
It is very disappointing for an information security professional to repeatedly discover how organizations neglect security basics. Vulnerability […]
In November 2013 I have published an article in the CSO Journal titled “The quest for weak links […]