CRA, Cybersecurity, Product security, Vulnerability management

Take control of your supply chain – part 1

Chances are that if you are building any type of non-trivial software product, you are standing on the shoulders of giants and rely on an existing ecosystem of open source or commercial components. You cannot really compile even the simplest Hello World in C...

Read More