How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Tim Carstens and Parker Thompson

Software vendors like to claim that their software is secure, but the effort and techniques applied to this end vary significantly across the industry. From an end-user's perspective, how do you identify those vendors who are effective at securing their software? From a vendor's perspective, how do you identify those techniques which are effective at improving security? Presenting joint work with Sarah Zatko, mudge, Patrick Stach, and Parker Thompson.

Related

Download

Embed

Share:

Tags